Why is it important for Service Providers to provide documents and records?
Why is it important for Service Providers to provide documents and records?
which of the following?
You are configuring a complex set of policies in your Windows 2003 Active Directory network. You
have parent and child GPOs. If you do not want the child GPO to inherit policy from the parent
GPO, you would do which of the following?
Which three of the following answers are used to create a protocol rule in ISA Server 2006?
During the configuration of your newly installed ISA Server 2006, you are creating new rules.
Which three of the following answers are used to create a protocol rule in ISA Server 2006?
Who should be recommended to support the Senior Responsible Owner in his/her responsibility for the delivery o
Who should be recommended to support the Senior Responsible Owner in his/her responsibility
for the delivery of the management system?
Which of the following best describes the Secure Security Templates (SECURE*.INF)?
You are in the process of securing several new machine on your Windows 2003 network. To help
with the process Microsoft has defined a set of Security Templates to use in various situations.
Which of the following best describes the Secure Security Templates (SECURE*.INF)?
what will the -N accomplish in the chain?
In the command ipchains -N chain , what will the -N accomplish in the chain?
what mode will NTLMv2 be installed in?
You run an enterprise network for a large company. There are a few isolated branches in the
company, which do not connect to the main network. You wish to increase the security of those
branches by implementing NTLMv2. Since, those branches are in areas of the world where United
States Export
Restrictions are not met, what mode will NTLMv2 be installed in?
what does this mean?
You are reviewing your companys IPTables Firewall and see the command (minus the quotes) ” !
10.10.216″ as part of a rule, what does this mean?
What do LM, NTLM, and NTLMv2 use as their Authentication method?
You are working on the configuration of the authentication systems used in your network, and are
considering several different authentication methods for your computer systems. What do LM,
NTLM, and NTLMv2 use as their Authentication method?
Which of the following would be the correct command to use?
You need to add a line to your IPTables Firewall input chain that will stop any attempts to use the
default install of Back Orifice against hosts on your network (the 10.10.10.0 network). Which of the
following would be the correct command to use?