What sort of virus protection should you implement?
You are responsible for virus protection for a large college campus. You are very concerned that your antivirus solution must be able to capture the latest virus threats. What sort of virus protection should you implement?
Why is this option not available?
You are the administrator for tvloft.com. As part of a technology refresh, you are planning an upgrade of all company computers from Windows XP to Windows 7. Before deploying this company wide, you test this upgrade in the lab. However, when you put the Windows 7 setup media into the test computer, you do not have the option to upgrade. All computers meet the minimum requirements. Why is this option not available?
Which of the following can be implemented to decrease the number of times a user is required to be authenticat
Which of the following can be implemented to decrease the number of times a user is required to be authenticated for access a particular resource?
Which of the following policies will you implement to accomplish the task?
You work as a Network Administrator for www.company.com Inc. You have implemented the registry-based group policy on your network. The TIFF language family differs from the System default language. You want to set the language code page for indexing TIFF document content. Which of the following policies will you implement to accomplish the task?
Which of the following viruses cannot be detected by the signature-based antivirus?
Which of the following viruses cannot be detected by the signature-based antivirus?
What will you do?
You work as a Server Administrator for www.company.com Inc. The company has a Windows-based network environment. All client computers on the network run Windows 7 Ultimate and all servers run Windows Server 2008 R2. You want to remove some applications and registry entries of the server. For this, you edit the registry and restart the system. You find that the system stops responding even before the logon screen appears. You want to restore the system to its previous configuration. What will you do?
Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?
Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?
Which of the following applets will you use to accomplish this task?
You work as a Database Administrator for Softech Inc. You want to create network connections, such as Local Area Networks (LANs) and Internet connections. Which of the following applets will you use to accomplish this task?
Which of the following is a attack type that is used to poison a network or computer to the point where the sy
Which of the following is a attack type that is used to poison a network or computer to the point where the system is turned into unusable state?
How can Rick permit network files to be modified by all users of the organization?
Rick works as a Desktop Administrator for www.company.com Inc. The company wants to network all computers so that the computers can share files and printers. All the computers are running Windows 7 Professional. There are some files that are not confidential and can be modified by anyone. He can set up sharing with only one printer at each cabin. How can Rick permit network files to be modified by all users of the organization?
