What is this?
You are taking over the security of an existing network. You discover a machine that is not being
used as such, but has software on it that emulates the activity of a sensitive database server. What is
this?
Which of the following browser settings will Sam use to accomplish this?
Sam works as a Web Developer for McRobert Inc. He wants to control the way in which a Web
browser receives information and downloads content from Web sites. Which of the following
browser settings will Sam use to accomplish this?
Which of the following actions will Mark take to prevent normal users from logging onto the systems?
Mark works as a Security Officer for TechMart Inc. The company has a Windows-based network. He
has bees assigned a project for ensuring the safety of the customer’s money and information, not to
mention the company’s reputation. The company has gone through a security audit to ensure that it
is in compliance with industry regulations and standards. Mark understands the request and has to
do his due diligence for providing any information the regulators require as they are targeting
potential security holes. In this situation, his major concern is the physical security of his company’s
system. He has a concern that people are authenticated to the servers in the data center. Which of
the following actions will Mark take to prevent normal users from logging onto the systems?
Which of the following types of viruses protects itself from antivirus programs and is more difficult to trace
Which of the following types of viruses protects itself from antivirus programs and is more difficult
to trace?
Which of the following is the edge between the private and locally managed-and-owned side of a network and the
Which of the following is the edge between the private and locally managed-and-owned side of a
network and the public side that is commonly managed by a service provider?
Which of the following will Mark use to accomplish the task?
Mark work as a System Administrator for TechMart Inc. The company has a Windows-based
network. Mark wants to allow the remote travel agents to be able to access the corporate network
so that they are free to check email and post appointments that are booked for the particular day.
Mark has decided to permit the travel agents to use their home computers but he is required to be
assured that the information is not compromised by anyone because the security of client
information is on the top priority for him. Which of the following will Mark use to accomplish the
task?
Which of the following practices should be followed to keep passwords secure?
Which of the following practices should be followed to keep passwords secure? Each correct answer
represents a complete solution. Choose three.
Which of the following collects email addresses of users and creates a mailing list?
Which of the following collects email addresses of users and creates a mailing list?
Which device will you install between your LAN and the Internet to accomplish this?
You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network.
You plan to connect your company’s LAN to the Internet. You are concerned about the security of
your network and want to protect it against external access and misuse. Which device will you install
between your LAN and the Internet to accomplish this?
which of the following is the file audit events are written when auditing is enabled?
In which of the following is the file audit events are written when auditing is enabled?