Which of the following security features of IE 7+ helps determine whether a Web site is a legitimate site?
Which of the following security features of IE 7+ helps determine whether a Web site is a legitimate
site?
What will Ron do to ensure that his domain name is not exploited?
Ron owns the domain TechPerfect.net. He often receives bounces about messages he didn’t send.
After looking at all such mails, he is sure that someone is spamming e-mails and using his domain
name. What will Ron do to ensure that his domain name is not exploited?
Which of the following points has to be considered for using the BitLocker?
Which of the following points has to be considered for using the BitLocker?
Which of the following is a program that runs at a specific date and time to cause unwanted and unauthorized f
Which of the following is a program that runs at a specific date and time to cause unwanted and
unauthorized functions?
Which of the following is a disadvantage of using biometric identification?
Which of the following is a disadvantage of using biometric identification?
Which of the following is a feature that you will use to reassign permissions without assigning permissions to
You work as a Network Administrator for TechMart Inc. The company has a Windows-based
network. After completing a security audit of the company’s Microsoft Windows Server 2008 R2 file
servers, you have determined that folder and share security requires a revision on the basis of
corporate reorganization. You have noticed that some shares on the file system are not secured.
Which of the following is a feature that you will use to reassign permissions without assigning
permissions to every parent and child folder?
Which of the following is a US Federal government algorithm created to generate a secure message digest?
Which of the following is a US Federal government algorithm created to generate a secure message
digest?
Which of the following can be implemented to ensure that the computers are using latest security updates?
Which of the following can be implemented to ensure that the computers are using latest security
updates?
Which of the following are the types of group scopes?
Which of the following are the types of group scopes? Each correct answer represents a complete
solution. Choose all that apply.
What will Mark do to accomplish the task?
Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008
domain-based network. Mark configures Network Access Protection (NAP) on the network. He then
configures secure wireless access to the network from all access points on the network. He also
configures 802.1x authentication for accessing the network. Mark wants to ensure that all
computers connecting to the network are checked by NAP for the required configuration and update
status. What will Mark do to accomplish the task?