What is the best solution for you to implement?
You work as a Network Administrator for a medium sized business. Spam has become a significant
problem for your company. You want to have a common network wide solution. You want a solution
that is easy to administer. However, you do not want your solution to hinder the performance of
your email server. What is the best solution for you to implement?
Which of the following MMC snap-in consoles is used to administer domain and forest functional levels and user
Which of the following MMC snap-in consoles is used to administer domain and forest functional
levels and user principal name (UPN) suffixes?
which is used to determine access to the network?
Which of the following refers to a security access control methodology whereby the 48-bit address is
assigned to each network card which is used to determine access to the network?
Which of the following security zones is used for Web sites that the user does not trust?
Which of the following security zones is used for Web sites that the user does not trust?
Which of the following works at the network layer and hides the local area network IP address and topology?
Which of the following works at the network layer and hides the local area network IP address and
topology?
What should he do to prevent this?
A user has opened a Web site that automatically starts downloading malicious code onto his
computer. What should he do to prevent this? Each correct answer represents a complete solution.
Choose two.
Which of the following authentication methods will you choose for Exchange ActiveSync?
You work as an Exchange Administrator for TechWorld Inc. The company has a Windows 2008 Active
Directory-based network. The network contains an Exchange Server 2010 organization. You are in
the process of choosing an authentication method for Exchange ActiveSync. You need an
authentication method that requires both, a password and an external device. Which of the
following authentication methods will you choose for Exchange ActiveSync?
Which of the following can search contents of a hard disk, address book of an e-mail…?
Which of the following can search contents of a hard disk, address book of an e-mail, or any
information about the computer, and transmit the information to the advertisers or other interested
parties without user knowledge?
which of the following attacks is the company being subjected to?
You work as a Network Administrator for SpyNet Inc. The company has a Windows-based network.
You have been assigned the task of auditing the scheduled network security. After a regular
audition, you suspect that the company is under attack by an intruder trying to gain access to the
company’s network resources. While analyzing the log files, you find that the IP address of the
intruder belongs to a trusted partner company. Assuming this situation, which of the following
attacks is the company being subjected to?
Which of the following steps will help in system or host hardening?
Which of the following steps will help in system or host hardening? Each correct answer represents a
complete solution. Choose two.