What should you do?
You need a strategy to log access to data on servers in the Manufacturing department.
What should you do?
What should you do?
You need to ensure that all TestLab, Inc. servers have the latest security and that no unnecessary services are running on the servers. You must ensure that your solution can be implemented by the members of the IT department at headquarters.
What should you do?
What should you do?
You need to log user permissions changes on server or on a domain controller. You also need to log changes to the local security account manager objects on all servers.
What should you do?
What should you do?
You are designing a certificate distribution method to meet the requirements of the Chief Security Officer.
What should you do? (Each correct answer presents part of the solution. Choose THREE.)
What should you do?
You need to design a solution for the desktop computers. The solution you are designing should ensure that the user’s desktop is protected when they leave their computers unattended. Your solution should require the least amount of administrative effort.
What should you do?
You are required to select which of the following to audit?
You need to design an auditing solution. The auditing solution you are designing should meet the requirements for the file server of the City Central Utilities network. You are required to select which of the following to audit?
What should you do?
You need to design a solution for network users using the Web content security zones. The solution you are designing should be used to prevent the network users from making changes to the settings for Web content security zones.
What should you do? (Each correct answer presents part of the solution. Choose TWO.)
What should you do?
You need to design an authentication solution for the wireless network. The solution you are designing should adhere to the security requirements of City Central Utilities. You are required to select which protocol is suitable for use on the portable computers with wireless technology.
What should you do?
What should you do?
You need to design an authentication strategy that will be used to strengthen the current network security. The solution you are designing must ensure you meet the requirements of City Central Utilities.
What should you do? (Each correct answer represents a part of the solution. Choose TWO.)
The solution you are designing should be employed to provide for the desired level of security the remote port
You need to design an authentication method for the portable computer used on the network. The solution you are designing should be employed to provide for the desired level of security the remote portable computer?