Which of the following viruses cannot be detected by th…
Which of the following viruses cannot be detected by the signature-based antivirus?
Choose the settings that are the part of Network Access Protection (NAP) health policies.
You work as a Network Administrator for NetTech Inc. The company has a Windows Server 2008
domain-based network. The network contains 4 Windows Server 2008 member server and 120 Windows
Vista client computers. Your assistant wants to know about the settings that make up Network Access
Protection (NAP) health policies. Choose the settings that are the part of Network Access Protection (NAP)
health policies.
Which of the following viruses infects Word 97 document…
Which of the following viruses infects Word 97 documents and the NORMAL.DOT file of Word 97 and
Word 2000?
Which of the following will he suggest his team members…
Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network.
The company had a many outbreaks of viruses on the network that are propagated via email. Mark wants to
educate his team about malicious software and email. Which of the following will he suggest his team
members to do when a suspicious email that contains an embedded hyperlink is received from a customer?
Mark is using a single perimeter ?
Mark works as a Network Administrator for BlueWell Inc. The company has a Windows-based network.
Mark has retained his services to perform a security assessment of the company’s network that has various
servers exposed to the Internet. So, it may be vulnerable to an attack. Mark is using a single
perimeter ?rewall, but he does not know if that is enough. He wants to review the situation and make some
reliable recommendations so that he can protect the data over company’s network. Which of the following will Mark do to accomplish the task?
Which of the following is a secret numeric password sha…
Which of the following is a secret numeric password shared between a user and a system for
authenticating the user to the system?
Which of the following are the features of security lev…
Which of the following are the features of security level in the Restricted Sites zone
How will you configure for dynamic updates?
All your domain controllers are configured for DHCP. Each time the system is booted, it gets a new IP
address from the DHCP server. You had also configured the Active Directory on the domain controllers. You
want to configure your DNS settings so that it will dynamically update DNS data whenever the IP address of
a domain controller changes. How will you configure for dynamic updates?
What will Mark do to accomplish the task?
1x authentication for accessing the network. Mark wants to ensure that all computers connecting to the
network are checked by NAP for the required configuration and update status. What will Mark do to
accomplish the task?
Which of the following technologies will you use to acc…
You work as a security manager for Company Inc. An individual is connecting to your corporate internal
network over the Internet. You have to ensure that he is not an intruder masquerading as an authorized
user. Which of the following technologies will you use to accomplish the task?