Which of the following authentication methods should Ma…
Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008
domain-based network. The network has a Windows Server 2008 member server that works as a Routing
and Remote Access Server (RRAS). Mark implements Network Access Protection (NAP) for the network.
Mark wants to configure Point-to-Point Protocol (PPP) authentication on the RRAS server. Which of the
following authentication methods should Mark use to accomplish this task?
Which of the following is the process of keeping track …
Which of the following is the process of keeping track of a user’s activity while accessing network
resources?
Which description best fits this code?
Your Web server crashes at exactly the point where it reaches 1 million total visits. You discover the
cause of the server crash is malicious code. Which description best fits this code?
which of the following is the level of security set for…
On which of the following is the level of security set for the restricted sites applied?
Which of the following ports is used by the IMAP4 protocol?
Which of the following ports is used by the IMAP4 protocol?
Which of the following can you set up to help enforce t…
You work as a network administrator for an insurance company called InZed Inc. The company has
developed a corporate policy that requires all machines to use the IPSec security protocol. If the computer
they are logging in from does not follow this corporate policy, they will be denied access to the network.
Which of the following can you set up to help enforce the corporate policy?
Which of the following actions should be taken so that …
Which of the following actions should be taken so that the computer requires confirmation before
installing an ActiveX component?
Which of the following types of attack is used to confi…
Which of the following types of attack is used to configure a computer to behave as another computer
on a trusted network by using the IP address or the physical address?
Which of the following changes are required to accompli…
You work as a Network Administrator for NetTech Inc. Your computer has the Windows 2000 Server
operating system. You want to harden the security of the server. Which of the following changes are
required to accomplish this? Each correct answer represents a complete solution. Choose two.
Which of the following layers defines the mechanisms th…
Which of the following layers defines the mechanisms that allow data to be passed from one network to
another?