which of the following is the level of security set for the local intranet zone applied?
On which of the following is the level of security set for the local intranet zone applied?
which encryption and decryption of data takes place?
Which of the following is the layer in which encryption and decryption of data takes place?
Which of the following root keys stores information about registered applications?
Which of the following root keys stores information about registered applications?
Which of the following is an organization that defines standards for anti-virus software?
Which of the following is an organization that defines standards for anti-virus software?
which of the following ways can Mark add another level of security after implanting encryption techniques for
Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based
network. The company is adding an open, high-speed, wireless access for their customers and
secured wireless for employees at all 37 branches. He wants to check the various security concerns
for ensuring that business traffic is secured. He is also under pressure to make this new feature a
winning strategy for a company.
In which of the following ways can Mark add another level of security after implanting encryption
techniques for the business wireless traffic? Each correct answer represents a complete solution.
Choose all that apply.
Which of the following can Mark do after enabling reverse DNS lookups to minimize the amount of spam?
Mark works as a Network Administrator fot Blue Well Inc. The company has a Windows-based
network. Mark is facing a series of problems with email spam and identifying theft via phishing
scams. He wants to implement the various security measures and to provide some education
because it is related to the best practices while using email. Which of the following can Mark do
after enabling reverse DNS lookups to minimize the amount of spam?
Mark is required to ensure the con? dentiality of data on the mobile stations, all of which are running Window
Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based
network He has been assigned a project to take care of the sensitive data that can be hacked if any
of the laptop computers would be misplaced. Mark is required to ensure the con? dentiality of data
on the mobile stations, all of which are running Windows 7 Enterprise. Which of the following will
Mark use to accomplish the task?
Which of the following is more secure protocol between Point to Point Tunneling Protocol (PPTP) and Layer 2 Tu
Which of the following is more secure protocol between Point to Point Tunneling Protocol (PPTP)
and Layer 2 Tunneling Protocol (L2TP)?
Which of the following is a service can be enabled to ensure that the servers are able to receive all essentia
Which of the following is a service can be enabled to ensure that the servers are able to receive all
essential software updates?
Mark is using a single perimeter ?
Mark works as a Network Administrator for BlueWell Inc. The company has a Windows-based
network. Mark has retained his services to perform a security assessment of the company’s network
that has various servers exposed to the Internet. So, it may be vulnerable to an attack. Mark is using
a single perimeter ?rewall, but he does not know if that is enough. He wants to review the situation
and make some reliable recommendations so that he can protect the data over company’s network.
Which of the following will Mark use to inspect network information on the basis of source and
destination address?