Which of the following passwords should you set in the BIOS to restrict access?
You are working as a technician at Certkiller .com. You are asked to setup a couple of computers
in the reception. The computers will be available for anyone visiting Certkiller .com.Which of the
following passwords should you set in the BIOS to restrict access?
What would you recommend users should do when the Certkiller .com password policy requires that passwords be c
What would you recommend users should do when the Certkiller .com password policy requires
that passwords be changed on a monthly basis.
Which tool can users use to improve security on a Windows based operating system?
Which tool can users use to improve security on a Windows based operating system?
What is the term used to refer to anti-virus software update files?
What is the term used to refer to anti-virus software update files?
What should you do when you discover that a user is storing passwords in a text file on his desktop?
What should you do when you discover that a user is storing passwords in a text file on his
desktop?
Explain what the Certkiller .com technician should do to help prevent this from occurring.
Unauthorized computers could possibly get connected to Certkiller .com’s wireless access point.
Explain what the Certkiller .com technician should do to help prevent this from occurring.
What should you do next to secure the wireless network?
You work as the security administrator at Certkiller .com. You want to implement a solution which
will secure the wireless network. The Certkiller .comwireless network environment uses access
points as repeaters.
What should you do next to secure the wireless network?
Which solution should you implement?
You work as the security administrator at Certkiller .com. You want to implement a solution which
will provide a WLAN (Wireless Local Area Network) with the security typically associated with a
wired LAN (Local Area Network): Which solution should you implement?
Which solution should you implement?
You work as the security administrator at Certkiller .com. You want to prevent intruders from using
access points on your wireless network? Which solution should you implement?
Which of the following symptoms will occur?
You work as the network operator at Certkiller .com. A user has entered the wrong WEP (Wired
Equivalent Privacy) key into a wireless device. Which of the following symptoms will occur?