Which of the following is a US Federal government algorithm created to generate a secure message digest?
Which of the following is a US Federal government algorithm created to generate a secure message
digest?
Which of the following can be implemented to ensure that the computers are using latest security updates?
Which of the following can be implemented to ensure that the computers are using latest security
updates?
Which of the following are the types of group scopes?
Which of the following are the types of group scopes? Each correct answer represents a complete
solution. Choose all that apply.
What will Mark do to accomplish the task?
Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008
domain-based network. Mark configures Network Access Protection (NAP) on the network. He then
configures secure wireless access to the network from all access points on the network. He also
configures 802.1x authentication for accessing the network. Mark wants to ensure that all
computers connecting to the network are checked by NAP for the required configuration and update
status. What will Mark do to accomplish the task?
Which of the following technologies will you use to accomplish the task?
You work as a security manager for Company Inc. An individual is connecting to your corporate
internal network over the Internet. You have to ensure that he is not an intruder masquerading as an
authorized user. Which of the following technologies will you use to accomplish the task?
Which of the following areas of a network contains DNS servers and Web servers for Internet users?
Which of the following areas of a network contains DNS servers and Web servers for Internet users?
How will you configure for dynamic updates?
All your domain controllers are configured for DHCP. Each time the system is booted, it gets a new IP
address from the DHCP server. You had also configured the Active Directory on the domain
controllers. You want to configure your DNS settings so that it will dynamically update DNS data
whenever the IP address of a domain controller changes. How will you configure for dynamic
updates?
Which of the following are the features of security level in the Restricted Sites zone
Which of the following are the features of security level in the Restricted Sites zone
Which of the following is a secret numeric password shared between a user and a system for authenticating the
Which of the following is a secret numeric password shared between a user and a system for
authenticating the user to the system?
Mark is using a single perimeter ?
Mark works as a Network Administrator for BlueWell Inc. The company has a Windows-based
network. Mark has retained his services to perform a security assessment of the company’s network
that has various servers exposed to the Internet. So, it may be vulnerable to an attack. Mark is using
a single perimeter ?rewall, but he does not know if that is enough. He wants to review the situation
and make some reliable recommendations so that he can protect the data over company’s network.
Which of the following will Mark do to accomplish the task?