Which of the following security features of IE 7+ makes…
Which of the following security features of IE 7+ makes it more difficult for malware to be installed?
Which of the following will he do for those computers i…
Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network.
Mark wants to implement a method to ensure that the mobile devices are in a good state of security health
when they are trying to access the corporate network. For this purpose, Mark is using NAP. Which of the
following will he do for those computers in the network that are not compatible with NAP?
Which of the following actions will Mark take to ensure…
Mark works as a Security Officer for TechMart Inc. The company has a Windows-based network. He
has bees assigned a project for ensuring the safety of the customer’s money and information, not to
mention the company’s reputation. The company has gone through a security audit to ensure that it is in
compliance with industry regulations and standards. Mark understands the request and has to do his due diligence for providing any information the regulators
require as they are targeting potential security holes.
In this situation, his major concern is the physical security of his company’s system. Which of the following
actions will Mark take to ensure the physical security of the company’s desktop computers?
what level of security is set for the Local intranet zone?
By default, what level of security is set for the Local intranet zone?
Which of the following is a set of rules that control t…
Which of the following is a set of rules that control the working environment of user accounts and computer accounts?
What should you do to block this unwanted traffic?
You check the logs on several clients and find that there is traffic coming in on an odd port (port 1872).
All clients have the Windows XP firewall turned on. What should you do to block this unwanted traffic?
Which of the following is a Windows configuration optio…
Which of the following is a Windows configuration option that enables administrators to restrict
communication among domain members only?
Which of the following technologies will you use to acc…
You work as a Network Administrator for Tech Perfect Inc. The company has a Windows 2008 Active
Directory-based network. All client computers on the network run Windows Vista Ultimate. You have
configured a Dynamic DNS (DDNS) on the network. There are a lot of mobile users who often connect to
and disconnect from the network. Users on the network complain of slow network responses. You suspect
that the stale records on the DNS server may be the cause of the issue. You want to remove the stale
records.Which of the following technologies will you use to accomplish the task?
Which of the following Windows components ensure that o…
You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008
network environment. The network is configured as a Windows Active Directory-based single forest
single domain network. You want to configure Network Access Protection (NAP) on your network.
You want that the clients connecting to the network must contain certain configurations. Which of
the following Windows components ensure that only clients having certain health benchmarks
access the network resources? Each correct answer represents a part of the solution. Choose two.
Which of the following are types of password policies o…
Which of the following are types of password policies of Windows 7? Each correct answer represents a
complete solution. Choose all that apply.