What should you do?
You work as a network administrator at Bilco Engineering, Inc. You have recently received instruction to configure the servers hosting confidential data. The solution you are busy designing should require security related actions performed by an administrator that affects company servers to be logged. You are required to select which of the actions you would perform.
What should you do?
What should you do?
You work as a network administrator at Bilco Engineering, Inc. You have received instruction recently to start the design that includes features that meet the written security policy requirements for the Bilco Engineering, Inc. network. You are required to select which of the authentication protocols should be used for wireless connection clients in the design. What should you do? (Each correct answer presents part of the solution. Choose TWO.)
What should you do?
You work as a network administrator at Bilco Engineering, Inc. You have received instruction recently to start the design of a permission structure for registry objects that enables the legacy application at the retail offices to run. You are required to make your design solution comply with the written security policy.
What should you do?
What should you do?
You work as a network administrator at Bilco Engineering, Inc. The Bilco Engineering, Inc. employees require connecting to the Bilco Engineering, Inc. network using wireless technology.
You have received instruction to start the design of a Security strategy for the wireless network at all resort locations.
What should you do?
What should you do?
You work as a network administrator at Bilco Engineering, Inc. You have received instruction from the Bilco Engineering, Inc. CIO to start designing a security strategy for the infrastructure servers at the resorts. You are required to select which of the actions you should perform. What should you do? (Each correct answer presents part of the solution. Choose TWO.)
What should you do?
You work as the network administrator at Bilco Engineering, Inc. You have recently received instruction to start designing the configuration for the kiosk computers. The configuration you design for the kiosk computers should be implemented by using the minimum amount of administrative effort.
What should you do?
What should you do?
You need to implement a new patch management system. There are some steps that should be performed prior to the implementation of the new patch system.
What should you do?
What should you do?
You need to design a monitoring strategy for the folders that contain confidential customer information, in the Customer Data folder to support the new data retention strategy.
What should you do?
What should you do?
You need to design a method to update the content on the Web server whilst ensuring that your solution meet business and security requirements. What should you do? (Each correct answer presents a complete solution. Choose TWO.)
What should you do?
You need to design a method to encrypt confidential data whilst ensuring that your solution address the concerns of the chief information officer.
What should you do?