Which of the following technologies will you use to accomplish the task?
You work as a security manager for Company Inc. An individual is connecting to your corporate
internal network over the Internet. You have to ensure that he is not an intruder masquerading as an
authorized user. Which of the following technologies will you use to accomplish the task?
Which of the following areas of a network contains DNS servers and Web servers for Internet users?
Which of the following areas of a network contains DNS servers and Web servers for Internet users?
How will you configure for dynamic updates?
All your domain controllers are configured for DHCP. Each time the system is booted, it gets a new IP
address from the DHCP server. You had also configured the Active Directory on the domain
controllers. You want to configure your DNS settings so that it will dynamically update DNS data
whenever the IP address of a domain controller changes. How will you configure for dynamic
updates?
Which of the following are the features of security level in the Restricted Sites zone
Which of the following are the features of security level in the Restricted Sites zone
Mark is using a single perimeter ?
Mark works as a Network Administrator for BlueWell Inc. The company has a Windows-based
network. Mark has retained his services to perform a security assessment of the company’s network
that has various servers exposed to the Internet. So, it may be vulnerable to an attack. Mark is using
a single perimeter ?rewall, but he does not know if that is enough. He wants to review the situation
and make some reliable recommendations so that he can protect the data over company’s network.
Which of the following will Mark do to accomplish the task?
Which of the following is a security protocol that is used to protect data from being modified, corrupted, or
Which of the following is a security protocol that is used to protect data from being modified,
corrupted, or accessed without authorization?
Which of the following protocols is used to secure workstation and computer authentication across the network?
Which of the following protocols is used to secure workstation and computer authentication across
the network?
Which of the following will he suggest his team members to do when a suspicious email that contains an embedde
Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based
network. The company had a many outbreaks of viruses on the network that are propagated via
email. Mark wants to educate his team about malicious software and email. Which of the following
will he suggest his team members to do when a suspicious email that contains an embedded
hyperlink is received from a customer?
Which of the following viruses infects Word 97 documents and the NORMAL.DOT file of Word 97 and Word 2000?
Which of the following viruses infects Word 97 documents and the NORMAL.DOT file of Word 97
and Word 2000?
Choose the settings that are the part of Network Access Protection (NAP) health policies.
You work as a Network Administrator for NetTech Inc. The company has a Windows Server 2008
domain-based network. The network contains 4 Windows Server 2008 member server and 120
Windows Vista client computers. Your assistant wants to know about the settings that make up
Network Access Protection (NAP) health policies. Choose the settings that are the part of Network
Access Protection (NAP) health policies.