Which of the following is a secret numeric password sha…
Which of the following is a secret numeric password shared between a user and a system for
authenticating the user to the system?
Which of the following are the features of security lev…
Which of the following are the features of security level in the Restricted Sites zone
How will you configure for dynamic updates?
All your domain controllers are configured for DHCP. Each time the system is booted, it gets a new IP
address from the DHCP server. You had also configured the Active Directory on the domain controllers. You
want to configure your DNS settings so that it will dynamically update DNS data whenever the IP address of
a domain controller changes. How will you configure for dynamic updates?
Which of the following technologies will you use to acc…
You work as a security manager for Company Inc. An individual is connecting to your corporate internal
network over the Internet. You have to ensure that he is not an intruder masquerading as an authorized
user. Which of the following technologies will you use to accomplish the task?
What will Mark do to accomplish the task?
1x authentication for accessing the network. Mark wants to ensure that all computers connecting to the
network are checked by NAP for the required configuration and update status. What will Mark do to
accomplish the task?
Which of the following are the types of group scopes?
Which of the following are the types of group scopes? Each correct answer represents a complete
solution. Choose all that apply.
Which of the following can be implemented to ensure tha…
Which of the following can be implemented to ensure that the computers are using latest security
updates?
Which of the following is a US Federal government algor…
Which of the following is a US Federal government algorithm created to generate a secure message
digest?
Which of the following is a disadvantage of using biome…
Which of the following is a disadvantage of using biometric identification?
Which of the following is a program that runs at a spec…
Which of the following is a program that runs at a specific date and time to cause unwanted and
unauthorized functions?