Which network device allows two-factor authentication to be implemented, based on the usage of smart cards?
Which network device allows two-factor authentication to be implemented, based on the usage of
smart cards?
What solution should you use?
You work as the security administrator at Certkiller .com. You want to implement a remote access
solution that will enable mobile users to access the corporate
Certkiller .com network. All mobile users will be using laptops that have Ethernet adapters to
access shared files and e-mail on the corporate Certkiller .com network. Half of the laptops are
equipped with modems.
What solution should you use?
Which security consideration should you be aware of?
You work as the security administrator at Certkiller .com. You plan to implement a VPN (Virtual
Private Network). Which security consideration should you be aware of?
Which type of technology runs on workstations or network devices to monitor and track network activity, and ca
Which type of technology runs on workstations or network devices to monitor and track network
activity, and can be configured to raise an alarm when security breaches occur?
Which solution should you use to enforce your requirements?
You work as the security administrator at Certkiller .com. You have been instructed to perform the
configuration which will allow only HTTP (Hypertext Transfer Protocol) traffic for outbound Internet
connections. In addition to this requirement, only specific users must have permissions to browse
the web.
Which solution should you use to enforce your requirements?
What would you answer be?
You are a technician working for Certkiller .com. Certkiller .com has a password policy that
requires users to change passwords monthly. A user approaches you and asks which of the
following alternatives that would be considered safest when dealing with passwords. What would
you answer be?
Which of the given alternatives will help you in your task?
As a Certkiller .com technician you are asked to improve the security of a workstation with a
Windows based operating system. Which of the given alternatives will help you in your task?
which users have permissions to install drivers?
You are working as a technician at Certkiller .com. You have been asked to document which users
that have permissions to install drivers on Certkiller .com’s workstations. Which of the following
would be used to check which users have permissions to install drivers? (Select TWO).
Which of the following alternatives would you suggest as a good starting point?
You are working as a technician at Certkiller .com. Your boss asks for your opinion in the best
method to help prevent malware threats. Which of the following alternatives would you suggest as
a good starting point?
Which of the following actions should you take?
You are working as a network technician at Certkiller .com. One of Certkiller ‘s intranet SSL
certificates is no longer valid in Internet Explorer. Which of the following actions should you take?