Which of the following Windows components ensure that only clients having certain health benchmarks access the
You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008
network environment. The network is configured as a Windows Active Directory-based single forest
single domain network. You want to configure Network Access Protection (NAP) on your network.
You want that the clients connecting to the network must contain certain configurations. Which of
the following Windows components ensure that only clients having certain health benchmarks
access the network resources? Each correct answer represents a part of the solution. Choose two.
Which of the following technologies will you use to accomplish the task?
You work as a Network Administrator for Tech Perfect Inc. The company has a Windows 2008 Active
Directory-based network. All client computers on the network run Windows Vista Ultimate. You
have configured a Dynamic DNS (DDNS) on the network. There are a lot of mobile users who often
connect to and disconnect from the network. Users on the network complain of slow network
responses. You suspect that the stale records on the DNS server may be the cause of the issue. You
want to remove the stale records. Which of the following technologies will you use to accomplish
the task?
Which of the following is the process used by attackers for listening to the network traffic?
Which of the following is the process used by attackers for listening to the network traffic?
Which of the following is a Windows configuration option that enables administrators to restrict communication
Which of the following is a Windows configuration option that enables administrators to restrict
communication among domain members only?
Which of the following are required to enable for preventing the users from downloading and installing softwar
Which of the following are required to enable for preventing the users from downloading and
installing software from the Internet? Each correct answer represents a complete solution. Choose
all that apply.
What should you do to block this unwanted traffic?
You check the logs on several clients and find that there is traffic coming in on an odd port (port
1872). All clients have the Windows XP firewall turned on. What should you do to block this
unwanted traffic?
Which of the following is a set of rules that control the working environment of user accounts and computer ac
Which of the following is a set of rules that control the working environment of user accounts and
computer accounts?
what level of security is set for the Local intranet zone?
By default, what level of security is set for the Local intranet zone?
Mark is also educating his users to be good Internet citizens and use the safe web sur?
Mark works as a Desktop Administrator for TechMart Inc. The company has a Windows-based
network. He has bees assigned a project to upgrade the browsers to Internet Explorer (IE) 8 for
working with the latest Internet technologies Mark wants to ensure that the company uses a
number of the security features built into the browser while maintaining functionality within the
company’s intranet. Mark is also educating his users to be good Internet citizens and use the safe
web sur?ng. Mark asked his team to be assured that they are on a secured website. What they will
do?
Which of the following actions will Mark take to ensure the physical security of the company’s desktop c
Mark works as a Security Officer for TechMart Inc. The company has a Windows-based network. He
has bees assigned a project for ensuring the safety of the customer’s money and information, not to
mention the company’s reputation. The company has gone through a security audit to ensure that it
is in compliance with industry regulations and standards. Mark understands the request and has to
do his due diligence for providing any information the regulators require as they are targeting
potential security holes. In this situation, his major concern is the physical security of his company’s
system. Which of the following actions will Mark take to ensure the physical security of the
company’s desktop computers?