same password policies, lockout policies, etc.) through…
You want to standardize security throughout your network. You primarily use Microsoft operating systems
for servers and workstations. What is the best way to have standardized security (i.e. same password
policies, lockout policies, etc.) throughout the network on clients and servers?
Which of the following protects against unauthorized ac…
Which of the following protects against unauthorized access to confidential information via encryption and works at the network layer?
Which of the following is the basic troubleshooting ste…
Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network.
The company is adding an open, high-speed, wireless access for their customers and secured wireless for
employees at all 37 branches. He wants to check the various security concerns for ensuring that business
traffic is secured. He is also in under pressure to make this new feature a winning strategy for a company.
Mark wants the employees to be free to troubleshoot their own wireless connections before contacting him.
Which of the following is the basic troubleshooting step that he can ask them to do?
Which of the following is the reason of logging by Mark…
Mark works as a Systems Administrator for TechMart Incl. The company has Windows-based network.
Mark has been assigned a project to track who tries to log into the system and the time of the day at which
the attempts occur. He is also required to create a system to track when confidential files are opened and
who is trying to open it. Now, Mark logs when someone is not able to make a successful attempt to log into
the system as Administrator but he also wants to log when the user is successful to log into the system as
Administrator. Which of the following is the reason of logging by Mark when a user is successfully logged
into the system as well as when he is failed?
Which of the following contains a tree of domain names?
Which of the following contains a tree of domain names?
which data is changed before or while it is entered int…
Which of the following is a process in which data is changed before or while it is entered into a computer
system?
choose the startup options that can be selected if the computer has a built-in TPM chip.
Which Transact-SQL query should you use?
Your database contains a table named Purchases. The table includes a DATETIME column named PurchaseTime that stores the date and time each purchase is
made. There is a non- clustered index on the PurchaseTime column. The business team wants a report that displays the total number of purchases made on the
current day. You need to write a query that will return the correct results in the most efficient manner.
Which Transact-SQL query should you use?
Which table hint should you use?
You develop a Microsoft SQL Server 2012 database that contains a heap named OrdersHistoncal.
You write the following Transact-SQL query:
INSERT INTO OrdersHistorical
SELECT * FROM CompletedOrders
You need to optimize transaction logging and locking for the statement.
Which table hint should you use?
Which Transact-SQL statement should you use?
You administer a SQL Server 2012 server that contains a database named SalesDb. SalesDb contains a schema named Customers that has a table named
Regions. A user named UserA is a member of a role named Sales. UserA is granted the Select permission on the Regions table. The Sales role is granted the
Select permission on the Customers schema.
You need to ensure that the following requirements are met:
The Sales role does not have the Select permission on the Customers schema. UserA has the Select permission on the Regions table.
Which Transact-SQL statement should you use?