What should you do?
You need to log user permissions changes on server or on a domain controller. You also need to log changes to the local security account manager objects on all servers.
What should you do?
What should you do?
You are designing a certificate distribution method to meet the requirements of the Chief Security Officer.
What should you do? (Each correct answer presents part of the solution. Choose THREE.)
What should you do?
You need to design a solution for the desktop computers. The solution you are designing should ensure that the user’s desktop is protected when they leave their computers unattended. Your solution should require the least amount of administrative effort.
What should you do?
You are required to select which of the following to audit?
You need to design an auditing solution. The auditing solution you are designing should meet the requirements for the file server of the City Central Utilities network. You are required to select which of the following to audit?
What should you do?
You need to design a solution for network users using the Web content security zones. The solution you are designing should be used to prevent the network users from making changes to the settings for Web content security zones.
What should you do? (Each correct answer presents part of the solution. Choose TWO.)
What should you do?
You need to design an authentication solution for the wireless network. The solution you are designing should adhere to the security requirements of City Central Utilities. You are required to select which protocol is suitable for use on the portable computers with wireless technology.
What should you do?
What should you do?
You need to design an authentication strategy that will be used to strengthen the current network security. The solution you are designing must ensure you meet the requirements of City Central Utilities.
What should you do? (Each correct answer represents a part of the solution. Choose TWO.)
The solution you are designing should be employed to provide for the desired level of security the remote port
You need to design an authentication method for the portable computer used on the network. The solution you are designing should be employed to provide for the desired level of security the remote portable computer?
What should you do?
You need to design a solution for the client computers in the Brisbane office. The solution you are designing should configure the client computers to meet the requirements of the network Chief Security Officer.
What should you do?
What should you do?
You need to modify the Default Domain Policy GPO. You should stop the ability of the network users to install any application which is not approved. Your solution is required to prevent the network users of the City Central Utilities network from being able to install unauthorized software.
What should you do?