What should you do to block this unwanted traffic?
You check the logs on several clients and find that there is traffic coming in on an odd port (port 1872).
All clients have the Windows XP firewall turned on. What should you do to block this unwanted traffic?
Which of the following is a Windows configuration optio…
Which of the following is a Windows configuration option that enables administrators to restrict
communication among domain members only?
Which of the following technologies will you use to acc…
You work as a Network Administrator for Tech Perfect Inc. The company has a Windows 2008 Active
Directory-based network. All client computers on the network run Windows Vista Ultimate. You have
configured a Dynamic DNS (DDNS) on the network. There are a lot of mobile users who often connect to
and disconnect from the network. Users on the network complain of slow network responses. You suspect
that the stale records on the DNS server may be the cause of the issue. You want to remove the stale
records.Which of the following technologies will you use to accomplish the task?
Which of the following Windows components ensure that o…
You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008
network environment. The network is configured as a Windows Active Directory-based single forest
single domain network. You want to configure Network Access Protection (NAP) on your network.
You want that the clients connecting to the network must contain certain configurations. Which of
the following Windows components ensure that only clients having certain health benchmarks
access the network resources? Each correct answer represents a part of the solution. Choose two.
Which of the following are types of password policies o…
Which of the following are types of password policies of Windows 7? Each correct answer represents a
complete solution. Choose all that apply.
Which of the following can be installed and configured …
Which of the following can be installed and configured to prevent suspicious emails from entering the
user’s network?
Which of following is required to be configured to ensu…
Which of following is required to be configured to ensure that the Bitlocker storage can be reclaimed?
Which of the following are the major components of the …
Which of the following are the major components of the IPsec protocol? Each correct answer represents
a complete solution. Choose all that apply.
Which of the following states that a user should never …
Which of the following states that a user should never be given more privileges than are required to
carry out a task?
Which of the following infects the computer and then hi…
Which of the following infects the computer and then hides itself from detection by antivirus software?