What program could Hanna use to recover the archive password for the director?
Hanna is the network administrator for her company. Hanna is responsible for all network functions, including corporate email. Hanna receives a call fromthe Director of Administration one morning saying he cannot access one of his archive files. Hanna goes to the director�s office and tries to open the archivefile from inside his Outlook 2003 client. The program says that she needs a password to open the file. Apparently, the director password protected the archivefile without realizing it. What program could Hanna use to recover the archive password for the director?
Why is using passwords to protect PDF documents not enough to safeguard against information leakage?
Heather is the network administrator for her company, a small medical billing company in Billings. Since the company handles personal information for thousands of clients, they must comply with HIPAA rules and regulations. Heather downloads all the HIPAA requirements for information security and begins an audit of the company. Heather finds out that many of the billing technicians have beensending sensitive information in PDF documents to outside companies. To protec
t this information, they have been password protecting the PDF documents. Heather has informed all the technicians that this method of protecting the data is not safe enough. Why is using passwords to protect PDF documents not enough to safeguard against information leakage?
What built-in technology used by Check Point firewalls protects traffic on both the network and application la
You are the IT manager for a small investment firm in Los Angeles. Including you, the firm only employs a total of 20 people. You were hired on last monthto take over the position of the last IT manager that was fired. The last manager did not have any security measures in place for the firm�s network; which led to a data breach. You have decided to purchase the Check Point firewall modelFirewall-1 to help secure the network. You have chosen this particular firewall because of its adaptive and intelligent inspection technology that protects both the network and application layers. What built-in technology used by Check Point firewalls protects traffic on both the network and application layers?
Why are these laptops not able to connect to other computers afterDylan installed Doorstop X Firewall?
Dylan is the systems administrator for Intern Support Staffing, an IT staffing company in Oregon. All workstations on the company�s network are running Windows XP SP2 except for three laptops that run MAC OS X. Even though Dylan has setup and configured a hardware firewall for the company, a recent audit suggested he utilize application-level firewalls for all workstations and mobile computers. Dylan configures the Windows Firewall settings for the Windows computers.Dylan then downloads and installs Doorstop X Firewall onto the MAC laptops. After installation, none of the MAC laptops can connect to any other computers on the network. Why are these laptops not able to connect to other computers afterDylan installed Doorstop X Firewall?
How can Geoffrey apply a different policy to the members of the executive team?
Geoffrey is the systems administrator for Veering Incorporated, a custom carmanufacturer in California. Geoffrey administers the corporate Windows Server2003 Active Directory network. He is also responsible for logical security. Al l computers are under one domain named veering.com. Geoffrey has organized alluser accounts by placing them in an Organizational Unit (OU) named Company Users. He has also created another OU named Company Computers that contains all computer accounts. After implementing a strong password policy through Active Direc tory, the executive team tells Geoffrey the policy is too stringent for them andthey would like their own policy. How can Geoffrey apply a different policy to the members of the executive team?
?What password policy settings does Kevin need to adjust to accomplish what his boss has asked himto do?
Kevin is the systems administrator for Inktime International, an ink cartridge replacement company based out of New Orleans. ?Kevin has been told by his boss that he needs to change the password policy on the network.Users are apparently reusing passwords over and over and changing them immediately whenever IT resets their passwords for them. Kevin s boss doesn’t want users to be able to change their passwords so often or be able to change their password right after IT resets their passwords. ?The company s network consists of one 2003 Active Directory domain. ?What password policy settings does Kevin need to adjust to accomplish what his boss has asked himto do? (Select 2)
What is the maximum password age that Charlie can set for the management team in a Server 2008 Active Director
Charlie is the systems administrator for his company, an aeronautics engineering company based in Dallas. Charlie is responsible for the entire network which consists of one Server 2008 Active Directory domain. All user accounts are in respective department Organizational Units (OU) such as Accounting Users, HR Users, and so on. All computer accounts are in respective department OUs such as Accounting Computers, HR Computers, and so on. The user accounts for the company�s management team are all under the Management Users OU. The computer accounts for the company�s management team are all under the Management Computers OU.Charlie has assigned a fine-grained password policy to only the management team because they wanted a different password policy than the rest of the company.According to company policy, all user accounts must have a password expiration policy applied to them. The management team does not want to have to deal with changing their passwords often like the other users. What is the maximum password age that Charlie can set for the management team in a Server 2008 Active Directory domain?
What password policy changemust she configure to allow the remote users access to the network?
Sherral is the systems administrator for Trigon Technologies, a software development company in Wichita. She oversees the entire network which consists ofone Windows Server 2003 Active Directory domain. To accommodate 20 new mobile users, Sherral has enabled Challenge Handshake Authentication Protocol (CHAP) andremote access to let the remote users get into the network from the outside. After applying these settings, Sherral receives calls from the remote users stating that they cannot authenticate with the network. What password policy changemust she configure to allow the remote users access to the network?
What setting must Willem adjust to ensure that user accounts must be manually reset by him when they are locke
Willem is the network administrator for his company, a toy manufacturing company in London. Willem manages the entire company�s network which consists of one Server 2003 Active Directory domain. Willem was hired on last month to replace the last administrator that retired. To Willem�s amazement, the company previously had no password policies in place. The CIO has just recently created new network policies which include a comprehensive password policy. This new password policy states that every password setting in group policy must be set. After implementing this new policy, many users are calling Willem and stating that they locked themselves out of their accounts. The CIO�s policy states that once a user locks him or herself out, they must wait a period of time until that account is unlocked. Willem has convinced the CIO to let him change that specific password policy so that Willem must manually unlock user accounts when they call. What setting must Willem adjust to ensure that user accounts must be manually reset by him when they are locked out?
How can Richard apply this setting across thenetwork if it is running under one Windows Server 2003 Active Dir
Richard is the systems administrator for BillRight Incorporated, a medical billing company in Minneapolis. Richard is currently writing the company�s IT security policies. Based on instructions from the IT director, Richard has written the password policy to require complex passwords, passwords must be at least 8characters, and user accounts will be locked out after 5 unsuccessful attemptsto help prevent against brute force attacks. One of the IT policies also statesthat user computers must utilize a password protected screensaver that is activated after 20 minutes of inactivity. Richard wants the logon attempts to unlocka screensaver to apply towards the number of attempts that will lockout a useraccount if tried too many times. How can Richard apply this setting across thenetwork if it is running under one Windows Server 2003 Active Directory domain?