Which of the following types of attack is used to configure a computer to behave as another computer on a trus
Which of the following types of attack is used to configure a computer to behave as another
computer on a trusted network by using the IP address or the physical address?
Which of the following actions should be taken so that the computer requires confirmation before installing an
Which of the following actions should be taken so that the computer requires confirmation before
installing an ActiveX component?
What are the main classes of biometric characteristics?
What are the main classes of biometric characteristics? Each correct answer represents a complete
solution. Choose two.
Which of the following can you set up to help enforce the corporate policy?
You work as a network administrator for an insurance company called InZed Inc. The company has
developed a corporate policy that requires all machines to use the IPSec security protocol. If the
computer they are logging in from does not follow this corporate policy, they will be denied access
to the network. Which of the following can you set up to help enforce the corporate policy?
Which of the following ports is used by the IMAP4 protocol?
Which of the following ports is used by the IMAP4 protocol?
which of the following is the level of security set for the restricted sites applied?
On which of the following is the level of security set for the restricted sites applied?
What will you do to accomplish this task?
You work as a Network Administrator for NetTech Inc. You want to prevent users from accessing the
graphical user interface (GUI) on the computers in the network. What will you do to accomplish this
task?
Which description best fits this code?
Your Web server crashes at exactly the point where it reaches 1 million total visits. You discover the
cause of the server crash is malicious code. Which description best fits this code?
Which of the following is the process of keeping track of a user’s activity while accessing network reso
Which of the following is the process of keeping track of a user’s activity while accessing network
resources?
Which of the following authentication methods should Mark use to accomplish this task?
Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008
domain-based network. The network has a Windows Server 2008 member server that works as a
Routing and Remote Access Server (RRAS). Mark implements Network Access Protection (NAP) for
the network. Mark wants to configure Point-to-Point Protocol (PPP) authentication on the RRAS
server. Which of the following authentication methods should Mark use to accomplish this task?