Which of the following is a cryptographic hash function?
Which of the following is a cryptographic hash function?
You are required to select proper action to take?
You work as the network administrator at Domain.com. You have recently installed the latest anti-virus software and updates on a client computer. During the course of the day a Domain.com network user requests you install additional software. You are required to select proper action to take?
As a best practice, risk assessments should be based upon which of the following?
As a best practice, risk assessments should be based upon which of the following?
Which of the following would be the BEST method to maintain a secure wireless network?
You are working as a network technician at Domain.com. You are asked to install a new wireless network in one of Domain.com’s branch offices. You have read about security flaws in wireless networks and therefore you are concerned with securing the wireless network as much as possible with reasonable amounts of administration. Which of the following would be the BEST method to maintain a secure wireless network?
USB drives create a potential security risk due to which of the following?
USB drives create a potential security risk due to which of the following?
Which of the following settings do you have to set to establish a secured wireless connection? (Choose TWO)
You are working as a network technician at Domain.com. You are setting up a wireless network in the HR department. Which of the following settings do you have to set to establish a secured wireless connection? (Choose TWO).
Which of the following preventive maintenance activities should you ensure is performed on a regular basis on
Which of the following preventive maintenance activities should you ensure is performed on a regular basis on a computer that is attached to a network that has access to the Internet?
The security administrator advises the marketing department not to distribute the USB pens due to which of the
The marketing department wants to distribute pens with embedded USB drives to clients. In the past this client has been victimized by social engineering attacks which led to a loss of sensitive data. The security administrator advises the marketing department not to distribute the USB pens due to which of the following?
What will you answer him?
You are working as a technician at Domain.com. You have just installed Service Pack 2 on your boss’s computer running Windows XP Professional. You boss wants to know what additional features will be available after installation and reboot.
What will you answer him?
Which of the following would have provided an alternative simpler solution?
To facilitate compliance with the Internet use portion of the corporate acceptable use policy, an administrator implements a series of proxy servers and firewalls. The administrator further recommends installation of software based firewalls on each host on the network. Which of the following would have provided an alternative simpler solution?