Which of the following will he do for those computers in the network that are not compatible with NAP?
Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based
network. Mark wants to implement a method to ensure that the mobile devices are in a good state
of security health when they are trying to access the corporate network. For this purpose, Mark is
using NAP. Which of the following will he do for those computers in the network that are not
compatible with NAP?
Which of the following is a collection or list of user accounts or computer accounts?
Which of the following is a collection or list of user accounts or computer accounts?
Which of the following security features of IE 7+ makes it more difficult for malware to be installed?
Which of the following security features of IE 7+ makes it more difficult for malware to be installed?
Which of the following viruses cannot be detected by signature-based antivirus?
Which of the following viruses cannot be detected by signature-based antivirus?
Which of the following is a secret numeric password shared between a user and a system for authenticating the
Which of the following is a secret numeric password shared between a user and a system for
authenticating the user to the system?
Which of the following can be installed for ensuring that the domain is secure in the remote locations?
Which of the following can be installed for ensuring that the domain is secure in the remote
locations?
Which of the following will you use to prevent unauthorized changes to computers on the domain?
You work as a Network Administrator for TechMart Inc. The company has a Windows-based
network. After completing a security audit of the company’s Microsoft Windows Server 2008 R2 file
servers, you have determined that folder and share security requires a revision on the basis of
corporate reorganization. You have noticed that some shares on the file system are not secured.
Which of the following will you use to prevent unauthorized changes to computers on the domain?
Which of the following is defined as a digitally signed statement used to authenticate and to secure informati
Which of the following is defined as a digitally signed statement used to authenticate and to secure
information on open networks?
Which of the following layers defines the mechanisms that allow data to be passed from one network to another?
Which of the following layers defines the mechanisms that allow data to be passed from one
network to another?
Which of the following changes are required to accomplish this?
You work as a Network Administrator for NetTech Inc. Your computer has the Windows 2000 Server
operating system. You want to harden the security of the server. Which of the following changes are
required to accomplish this? Each correct answer represents a complete solution. Choose two.