What fraud detection technique will the new retail portal beusing?
Pauline is the IT manager for Techworks, an online retailer based out of St.Louis. Pauline is in charge of 8 IT employees which include 3 developers. These developers have recently created a new checkout website that is supposed to be more secure than the one currently being used by the company. After numerousfraud attempts on the website, the company�s CIO decided that there needed to bea change; creating a more secure checkout portal that will check for potentialfraud. This new portal checks for fraud by looking for multiple orders that areto be delivered to the same address but using different cards, different ordersoriginating from the same IP address, credit card numbers vary by only a few digits, and users repeatedly submiting the same credit card numbers with differentexpiration dates. What fraud detection technique will the new retail portal beusing?
Why are these laptops not able to connect to other computers afterDylan installed Doorstop X Firewall?
Dylan is the systems administrator for Intern Support Staffing, an IT staffing company in Oregon. All workstations on the company�s network are running Windows XP SP2 except for three laptops that run MAC OS X. Even though Dylan has setup and configured a hardware firewall for the company, a recent audit suggested he utilize application-level firewalls for all workstations and mobile computers. Dylan configures the Windows Firewall settings for the Windows computers.Dylan then downloads and installs Doorstop X Firewall onto the MAC laptops. After installation, none of the MAC laptops can connect to any other computers on the network. Why are these laptops not able to connect to other computers afterDylan installed Doorstop X Firewall?
How can Geoffrey apply a different policy to the members of the executive team?
Geoffrey is the systems administrator for Veering Incorporated, a custom carmanufacturer in California. Geoffrey administers the corporate Windows Server2003 Active Directory network. He is also responsible for logical security. Al l computers are under one domain named veering.com. Geoffrey has organized alluser accounts by placing them in an Organizational Unit (OU) named Company Users. He has also created another OU named Company Computers that contains all computer accounts. After implementing a strong password policy through Active Direc tory, the executive team tells Geoffrey the policy is too stringent for them andthey would like their own policy. How can Geoffrey apply a different policy to the members of the executive team?
What program could Hanna use to recover the archive password for the director?
Hanna is the network administrator for her company. Hanna is responsible for all network functions, including corporate email. Hanna receives a call fromthe Director of Administration one morning saying he cannot access one of his archive files. Hanna goes to the director�s office and tries to open the archivefile from inside his Outlook 2003 client. The program says that she needs a password to open the file. Apparently, the director password protected the archivefile without realizing it. What program could Hanna use to recover the archive password for the director?
Why is using passwords to protect PDF documents not enough to safeguard against information leakage?
Heather is the network administrator for her company, a small medical billing company in Billings. Since the company handles personal information for thousands of clients, they must comply with HIPAA rules and regulations. Heather downloads all the HIPAA requirements for information security and begins an audit of the company. Heather finds out that many of the billing technicians have beensending sensitive information in PDF documents to outside companies. To protec
t this information, they have been password protecting the PDF documents. Heather has informed all the technicians that this method of protecting the data is not safe enough. Why is using passwords to protect PDF documents not enough to safeguard against information leakage?
What built-in technology used by Check Point firewalls protects traffic on both the network and application la
You are the IT manager for a small investment firm in Los Angeles. Including you, the firm only employs a total of 20 people. You were hired on last monthto take over the position of the last IT manager that was fired. The last manager did not have any security measures in place for the firm�s network; which led to a data breach. You have decided to purchase the Check Point firewall modelFirewall-1 to help secure the network. You have chosen this particular firewall because of its adaptive and intelligent inspection technology that protects both the network and application layers. What built-in technology used by Check Point firewalls protects traffic on both the network and application layers?
?What password policy settings does Kevin need to adjust to accomplish what his boss has asked himto do?
Kevin is the systems administrator for Inktime International, an ink cartridge replacement company based out of New Orleans. ?Kevin has been told by his boss that he needs to change the password policy on the network.Users are apparently reusing passwords over and over and changing them immediately whenever IT resets their passwords for them. Kevin s boss doesn’t want users to be able to change their passwords so often or be able to change their password right after IT resets their passwords. ?The company s network consists of one 2003 Active Directory domain. ?What password policy settings does Kevin need to adjust to accomplish what his boss has asked himto do? (Select 2)
What is the maximum password age that Charlie can set for the management team in a Server 2008 Active Director
Charlie is the systems administrator for his company, an aeronautics engineering company based in Dallas. Charlie is responsible for the entire network which consists of one Server 2008 Active Directory domain. All user accounts are in respective department Organizational Units (OU) such as Accounting Users, HR Users, and so on. All computer accounts are in respective department OUs such as Accounting Computers, HR Computers, and so on. The user accounts for the company�s management team are all under the Management Users OU. The computer accounts for the company�s management team are all under the Management Computers OU.Charlie has assigned a fine-grained password policy to only the management team because they wanted a different password policy than the rest of the company.According to company policy, all user accounts must have a password expiration policy applied to them. The management team does not want to have to deal with changing their passwords often like the other users. What is the maximum password age that Charlie can set for the management team in a Server 2008 Active Directory domain?
What password policy changemust she configure to allow the remote users access to the network?
Sherral is the systems administrator for Trigon Technologies, a software development company in Wichita. She oversees the entire network which consists ofone Windows Server 2003 Active Directory domain. To accommodate 20 new mobile users, Sherral has enabled Challenge Handshake Authentication Protocol (CHAP) andremote access to let the remote users get into the network from the outside. After applying these settings, Sherral receives calls from the remote users stating that they cannot authenticate with the network. What password policy changemust she configure to allow the remote users access to the network?
What setting must Willem adjust to ensure that user accounts must be manually reset by him when they are locke
Willem is the network administrator for his company, a toy manufacturing company in London. Willem manages the entire company�s network which consists of one Server 2003 Active Directory domain. Willem was hired on last month to replace the last administrator that retired. To Willem�s amazement, the company previously had no password policies in place. The CIO has just recently created new network policies which include a comprehensive password policy. This new password policy states that every password setting in group policy must be set. After implementing this new policy, many users are calling Willem and stating that they locked themselves out of their accounts. The CIO�s policy states that once a user locks him or herself out, they must wait a period of time until that account is unlocked. Willem has convinced the CIO to let him change that specific password policy so that Willem must manually unlock user accounts when they call. What setting must Willem adjust to ensure that user accounts must be manually reset by him when they are locked out?