Which of the following is the description of the Client (Respond Only) default IPSec Policy?
Your network is going to implement a new network security solution, and as part of this you are
configuring IPSec on a Windows Server 2003 machine. Which of the following is the description of
the Client (Respond Only) default IPSec Policy?
What is a best practice relating to documentation?
Documentation is a substantial part of the evidence for Service Management What is a best
practice relating to documentation?
Which process is responsible for sourcing and delivering components of requested standard services?
Which process is responsible for sourcing and delivering components of requested standard
services?
which of the following will be the result?
To maintain the security of your network you routinely run several checks of the network and
computers.
Often you use the built-in tools, such as netstat. If you run the following command:
netstat -e which of the following will be the result?
What is not a focus of the Change and Configuration SMF in the Operate phase?
What is not a focus of the Change and Configuration SMF in the Operate phase?
what is the function of the Session Layer?
In order to properly manage the network traffic in your organization, you need a complete
understanding
of protocols and networking models. In regards to the 7-layer OSI model, what is the function of
the Session Layer?
What does an IT service definition include?
What does an IT service definition include?
What is this advice an example of?
The Service Desk of supplier X continuous receives the same incident report. This concerns the
latest version of a client-server application. The problem no longer occurs if the former version is
re-installed. Because the cause of the incident has still not been traced, the supplier decides to
advise the customers to temporarily install the old version, if the problem occurs.
What is this advice an example of?
Which process is responsible for controlling, recording and reporting on the relationships between components
Which process is responsible for controlling, recording and reporting on the relationships between
components of the IT infrastructure?
What type of program is in the network?
One of your users calls to state that their computer is acting unusual. You go to investigate and
find there is an unauthorized program installed on this computer. You examine the network and
find that this program is now on other machines in the network. It seems to be unable to move
through the network on its own, and is getting sent as an email attachment. What type of program
is in the network?