Which of the following is a mechanism that allows authentication of dial-in and other network connections?
Which of the following is a mechanism that allows authentication of dial-in and other network
connections?
Mark is using a single perimeter ?
Mark works as a Network Administrator for BlueWell Inc. The company has a Windows-based
network. Mark has retained his services to perform a security assessment of the company’s network
that has various servers exposed to the Internet. So, it may be vulnerable to an attack. Mark is using
a single perimeter ?rewall, but he does not know if that is enough. He wants to review the situation
and make some reliable recommendations so that he can protect the data over company’s network.
Which of the following will Mark use to provide better security?
Which of the following can be used to implement two-factor authentications?
Which of the following can be used to implement two-factor authentications? Each correct answer
represents a complete solution. Choose all that apply.
Which of the following steps should John take as a countermeasure to this situation?
John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on
Windows Server 2003. One day, while analyzing the network security, he receives an error message
that Kernel32.exe is encountering a problem. Which of the following steps should John take as a
countermeasure to this situation? Each correct answer represents a complete solution. Choose all
that apply.
Which of the following is a physical address stored in the Network Interface card on your system or any other
Which of the following is a physical address stored in the Network Interface card on your system or
any other device residing on your network?
Which of the following is a control or strategy that Mark will implement to assure the security health?
Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based
network. Mark wants to implement a method to ensure that the mobile devices are in a good state
of security health when they are trying to access the corporate network. Which of the following is a
control or strategy that Mark will implement to assure the security health?
Which of the following is the reason of properly securing an audit log?
Which of the following is the reason of properly securing an audit log?
Which of the following ways will Mark use for educating his team members on the social engineering process?
Mark works as a Security Administrator for TechMart Inc. The company has a a Windows-based
network. Mark has gone through a security audit for ensuring that the technical system is secure and
protected. While this audit, he identified many areas that need improvement. He wants to minimize
the risk for potential security threats by educating team members in the area of social engineering,
and providing basic security principle knowledge while stressing the Condentiality, Integrity, and
Availability triangle in the training of his team members . Which of the following ways will Mark use
for educating his team members on the social engineering process?
Which of the following is used to describe the policy of maximum password age?
Which of the following is used to describe the policy of maximum password age?
Which of the following is often used for one-to-many communications using broadcast or multicast IP datagrams?
Which of the following is often used for one-to-many communications using broadcast or multicast
IP datagrams?