Which of the following is the best action to take?
You are working as a technician at AIOTestKing.com. You have been asked to replace all CRT monitors with LCD monitors in the HR department. In the process of doing this, you observe that many in the staff uses screen savers that you know is adware. The company does not have a policy addressing outside screen saver use. Which of the following is the best action to take?
Which of the following would you present to him?
You are working as a senior network technician at AIOTestKing.com. A trainee wants to know the name of a wireless security standard. Which of the following would you present to him?
which of the following scenarios?
Encrypting File System (EFS) is usable in which of the following scenarios?
which of the following characteristics a software firewall has compared to a hardware firewall. What will you
You are working as a technician at AIOTestKing.com. A colleague of you wonders about hardware and software firewalls. He asks you which of the following characteristics a software firewall has compared to a hardware firewall. What will you answer him? (Select TWO).
What will you answer him?
You are working as a technician at AIOTestKing.com. Your boss is thinking of installing a wireless network at home and wants to know the name of a commonly used encryption scheme for wireless networks. What will you answer him?
What will you answer the user?
You are working as a technician at AIOTestKing.com. A user wonders why Automatic Updates should be performed. What will you answer the user?
Which of the following alternatives could you also implement in order to make it harder for unauthorized users
You are working as a network technician at AIOTestKing.com. In an attempt to secure Certkiller ‘s wireless network you use a wireless sniffer around the company perimeters. You discover that several of the company’s Wireless Access Points (WAPs) are transmitting radio signals beyond the physical boundaries of Certkiller ‘s main office. You also discover that available bandwidth is suffering due to unauthorized wireless users. You start securing the network by turning down the power on the WAPs. Which of the following alternatives could you also implement in order to make it harder for unauthorized users to use bandwidth?
Which of the following would be an appropriate name for an unauthorized WAP?
You are working as a senior network technician at AIOTestKing.com’s main office. You have just finished a site survey of a wireless network at the main office. During this site survey you discovered an unauthorized WAP in one of the user’s cubicle. Which of the following would be an appropriate name for an unauthorized WAP?
Which of the following would be the BEST sequence of actions to take?
You are working as a technician at AIOTestKing.com. Certkiller has just created a new department with eight new employees that will handle user experience gathering. The new employees require the same permissions to the account database. Which of the following would be the BEST sequence of actions to take?
Which of the following suggestions would you present to him?
You are working as technician at AIOTestKing.com. Your boss asks you to give an example of account security policies. Which of the following suggestions would you present to him?