PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

In which of the following ways, the security training is related to providing availability?

Mark works as a Security Administrator for TechMart Inc. The company has a a Windows-based
network. Mark has gone through a security audit for ensuring that the technical system is secure and
protected. While this audit, he identified many areas that need improvement. He wants to minimize
the risk for potential security threats by educating team members in the area of social engineering,
and providing basic security principle knowledge while stressing the Condentiality, Integrity, and
Availability triangle in the training of his team members. In which of the following ways, the security
training is related to providing availability?

Which of the following utilities will you use to identify anomalies of records in the targeted DNS zone?

You work as an Exchange Administrator for UniCom Inc. The company has a Windows 2003 Active
Directory-based network. The network contains an Exchange Server 2007 organization. You have
deployed a DNS server in your messaging organization. The DNS server hosting the DNS zone data
for the Exchange Server is not capable of processing dynamic DNS updates. You decide to
troubleshoot DNS. Which of the following utilities will you use to identify anomalies of records in the
targeted DNS zone?

which of the following ways can Mark add another level of security after implanting encryption techniques for

Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based
network. The company is adding an open, high-speed, wireless access for their customers and
secured wireless for employees at all 37 branches. He wants to check the various security concerns
for ensuring that business traffic is secured. He is also under pressure to make this new feature a
winning strategy for a company.

In which of the following ways can Mark add another level of security after implanting encryption
techniques for the business wireless traffic? Each correct answer represents a complete solution.
Choose all that apply.