All clients have the Windows XP firewall turned on.What should you do to block this unwanted traffic?
You check the logs on several clients and find thatthere is traffic coming in on an odd port (port 1872).
All clients have the Windows XP firewall turned on.What should you do to block this unwanted traffic?
Which of the following is a set of rules that control the working environment of user accounts and computer ac
Which of the following is a set of rules that control the working environment of user accounts and computer accounts?
By default, what level of security is set for the Local intranet zone?
By default, what level of security is set for the Local intranet zone?
Mark is also educating his users to be good Internet citizens and use the safe web sur?ng.Mark asked his team
Mark works as a Desktop Administrator for TechMart Inc. The company has a Windows-based network.
He has bees assigned a project to upgrade the browsers to Internet Explorer (IE) 8 for working with the latest Internet technologies Mark wants to ensure that thecompany uses a number of the security features built into the browser while maintaining functionality within the company’s intranet. Mark is also educating his users to be good Internet citizens and use the safe web sur?ng.Mark asked his team to be assured that they are on a secured website. What they will do?
Which of the following actions will Mark take to ensure the physical security of the company’s desktop c
Mark works as a Security Officer for TechMart Inc. The company has a Windows-based network. He has bees assigned a project for ensuring the safety of the customer’s money and information, not to mention the company’s reputation. The company has gone through a security audit to ensure that it is in compliance with industry regulations and standards. Mark understands the request and has to do his due diligence for providing any information the regulators require as they are targeting potential security holes.
In this situation, his major concern is the physical security of his company’s system.
Which of the following actions will Mark take to ensure the physical security of the company’s desktop computers?
Which of the following will he do for those computers in the network that are not compatible with NAP?
Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network.
Mark wants to implement a method to ensure that themobile devices are in a good state of security health when they are trying to access the corporate network. For this purpose, Mark is using NAP.
Which of the following will he do for those computers in the network that are not compatible with NAP?
Which of the following is a collection or list of user accounts or computer accounts?
Which of the following is a collection or list of user accounts or computer accounts?
Which of the following security features of IE 7+ makes it more difficult for malware to be installed?
Which of the following security features of IE 7+ makes it more difficult for malware to be installed?
Which of the following viruses cannot be detected by signature-based antivirus?
Which of the following viruses cannot be detected by signature-based antivirus?
Which of the following is a secret numeric passwordshared between a user and a system for authenticating the u
Which of the following is a secret numeric passwordshared between a user and a system for authenticating the user to the system?