Which of the following can be used to implement two-factor authentications? Each correct answer represents a c
Which of the following can be used to implement two-factor authentications? Each correct answer represents a complete solution. Choose all that apply.
______________ is a special-purpose control panel (Mblctr.exe) that runs only on portable PCs running Windows
Fill in the blank with the appropriate term.
______________ is a special-purpose control panel (Mblctr.exe) that runs only on portable PCs running Windows 7 Home Premium or higher editions.
Which of the following steps should John take as a countermeasure to this situation? Each correct answer repre
John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem.
Which of the following steps should John take as a countermeasure to this situation? Each correct answer represents a complete solution. Choose all that apply.
_______________ is a tool that is used to modify different configuration settings, boot options, and startup o
Fill in the blank with the appropriate word.
_______________ is a tool that is used to modify different configuration settings, boot options, and startup options.
Which of the following is a physical address storedin the Network Interface card on your system or any other d
Which of the following is a physical address storedin the Network Interface card on your system or any other device residing on your network?
The__________________ is used to manage the set of policy-driven user logon, user logoff, computer startup, an
Fill in the blank with the appropriate term.
The__________________ is used to manage the set of policy-driven user logon, user logoff, computer startup, and computer shutdown scripts that are provided by the Windows.
What helps to remove specific prevalent malicious software from the computers that are running Windows 7, Wind
Fill in the blank with the appropriate term.
The __________________ helps to remove specific prevalent malicious software from the computers that are running Windows 7, Windows Vista, Windows Server 2003, Windows Server 2008, or Windows XP.
Which of the following is a control or strategy that Mark will implement to assure the security health?
Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network.
Mark wants to implement a method to ensure that themobile devices are in a good state of security health when they are trying to access the corporate network.
Which of the following is a control or strategy that Mark will implement to assure the security health?
________________ is a tool that helps a user find potential compatibility problems with the computer’s h
Fill in the blank with the appropriate term.
________________ is a tool that helps a user find potential compatibility problems with the computer’s hardware, devices, or programs that might affect installing Windows 7.
Which of the following ways will Mark use for educating his team members on the social engineering process?
Mark works as a Security Administrator for TechMartInc. The company has a a Windows-based network. Mark has gone through a security audit for ensuring thatthe technical system is secure and protected. While this audit, he identified many areas that need improvement. He wants to minimize the risk for potential security threats by educating team members in the area of social engineering, and providing basic security principle knowledge while stressing the Condentiality, Integrity, and Availability triangle in the training of his team members .
Which of the following ways will Mark use for educating his team members on the social engineering process?