Which of the following practices should be followed to keep passwords secure?
Which of the following practices should be followed to keep passwords secure? Each correct answer
represents a complete solution. Choose three.
Which of the following collects email addresses of users and creates a mailing list?
Which of the following collects email addresses of users and creates a mailing list?
Which device will you install between your LAN and the Internet to accomplish this?
You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network.
You plan to connect your company’s LAN to the Internet. You are concerned about the security of
your network and want to protect it against external access and misuse. Which device will you install
between your LAN and the Internet to accomplish this?
which of the following is the file audit events are written when auditing is enabled?
In which of the following is the file audit events are written when auditing is enabled?
Which of the following security features of IE 7+ helps determine whether a Web site is a legitimate site?
Which of the following security features of IE 7+ helps determine whether a Web site is a legitimate
site?
What will Ron do to ensure that his domain name is not exploited?
Ron owns the domain TechPerfect.net. He often receives bounces about messages he didn’t send.
After looking at all such mails, he is sure that someone is spamming e-mails and using his domain
name. What will Ron do to ensure that his domain name is not exploited?
Which of the following points has to be considered for using the BitLocker?
Which of the following points has to be considered for using the BitLocker?
Which of the following is a program that runs at a specific date and time to cause unwanted and unauthorized f
Which of the following is a program that runs at a specific date and time to cause unwanted and
unauthorized functions?
Which of the following is a disadvantage of using biometric identification?
Which of the following is a disadvantage of using biometric identification?
Which of the following is a feature that you will use to reassign permissions without assigning permissions to
You work as a Network Administrator for TechMart Inc. The company has a Windows-based
network. After completing a security audit of the company’s Microsoft Windows Server 2008 R2 file
servers, you have determined that folder and share security requires a revision on the basis of
corporate reorganization. You have noticed that some shares on the file system are not secured.
Which of the following is a feature that you will use to reassign permissions without assigning
permissions to every parent and child folder?