Which of the following services does IPSec provide for protecting data?
Which of the following services does IPSec provide for protecting data? Each correct answer
represents a complete solution. Choose two.
Which of the following functions are performed by a firewall?
Which of the following functions are performed by a firewall? Each correct answer represents a
complete solution. Choose all that apply.
Which of the following are indications of a virus attack on a computer?
Which of the following are indications of a virus attack on a computer? Each correct answer
represents a complete solution. Choose three.
In which of the following ways, the security training is related to providing availability?
Mark works as a Security Administrator for TechMart Inc. The company has a a Windows-based
network. Mark has gone through a security audit for ensuring that the technical system is secure and
protected. While this audit, he identified many areas that need improvement. He wants to minimize
the risk for potential security threats by educating team members in the area of social engineering,
and providing basic security principle knowledge while stressing the Condentiality, Integrity, and
Availability triangle in the training of his team members. In which of the following ways, the security
training is related to providing availability?
Which of the following utilities will you use to identify anomalies of records in the targeted DNS zone?
You work as an Exchange Administrator for UniCom Inc. The company has a Windows 2003 Active
Directory-based network. The network contains an Exchange Server 2007 organization. You have
deployed a DNS server in your messaging organization. The DNS server hosting the DNS zone data
for the Exchange Server is not capable of processing dynamic DNS updates. You decide to
troubleshoot DNS. Which of the following utilities will you use to identify anomalies of records in the
targeted DNS zone?
which of the following is the level of security set for the local intranet zone applied?
On which of the following is the level of security set for the local intranet zone applied?
which encryption and decryption of data takes place?
Which of the following is the layer in which encryption and decryption of data takes place?
Which of the following root keys stores information about registered applications?
Which of the following root keys stores information about registered applications?
Which of the following is an organization that defines standards for anti-virus software?
Which of the following is an organization that defines standards for anti-virus software?
which of the following ways can Mark add another level of security after implanting encryption techniques for
Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based
network. The company is adding an open, high-speed, wireless access for their customers and
secured wireless for employees at all 37 branches. He wants to check the various security concerns
for ensuring that business traffic is secured. He is also under pressure to make this new feature a
winning strategy for a company.
In which of the following ways can Mark add another level of security after implanting encryption
techniques for the business wireless traffic? Each correct answer represents a complete solution.
Choose all that apply.