Which of the following is defined as a digitally signed…
Which of the following is defined as a digitally signed statement used to authenticate and to secure
information on open networks?
Which of the following will you use to prevent unauthor…
You work as a Network Administrator for TechMart Inc. The company has a Windows-based network.
After completing a security audit of the company’s Microsoft Windows Server 2008 R2 file servers, you
have determined that folder and share security requires a revision on the basis of corporate reorganization.
You have noticed that some shares on the file system are not secured. Which of the following will you use to
prevent unauthorized changes to computers on the domain?
Which of the following can be installed for ensuring th…
Which of the following can be installed for ensuring that the domain is secure in the remote locations?
Which of the following is a secret numeric password sha…
Which of the following is a secret numeric password shared between a user and a system for
authenticating the user to the system?
Which of the following viruses cannot be detected by si…
Which of the following viruses cannot be detected by signature-based antivirus?
Which of the following security features of IE 7+ makes…
Which of the following security features of IE 7+ makes it more difficult for malware to be installed?
Which of the following will he do for those computers i…
Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network.
Mark wants to implement a method to ensure that the mobile devices are in a good state of security health
when they are trying to access the corporate network. For this purpose, Mark is using NAP. Which of the
following will he do for those computers in the network that are not compatible with NAP?
Which of the following actions will Mark take to ensure…
Mark works as a Security Officer for TechMart Inc. The company has a Windows-based network. He
has bees assigned a project for ensuring the safety of the customer’s money and information, not to
mention the company’s reputation. The company has gone through a security audit to ensure that it is in
compliance with industry regulations and standards. Mark understands the request and has to do his due diligence for providing any information the regulators
require as they are targeting potential security holes.
In this situation, his major concern is the physical security of his company’s system. Which of the following
actions will Mark take to ensure the physical security of the company’s desktop computers?
what level of security is set for the Local intranet zone?
By default, what level of security is set for the Local intranet zone?
Which of the following is a set of rules that control t…
Which of the following is a set of rules that control the working environment of user accounts and computer accounts?