What sort of virus protection should you implement?
You are responsible for virus protection for a large college campus. You are very concerned that your antivirus solution must be able to capture the latest virus threats. What sort of virus protection should you implement?
Which of the following can be implemented to decrease the number of times a user is required to be authenticat
Which of the following can be implemented to decrease the number of times a user is required to be authenticated for access a particular resource?
Which of the following viruses cannot be detected by the signature-based antivirus?
Which of the following viruses cannot be detected by the signature-based antivirus?
Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?
Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?
Which of the following is a attack type that is used to poison a network or computer to the point where the sy
Which of the following is a attack type that is used to poison a network or computer to the point where the system is turned into unusable state?
Which of the following is a broadcast domain created by a switch?
Which of the following is a broadcast domain created by a switch?
Which of the following is an authentication protocol?
Which of the following is an authentication protocol?
Which of the following are the main features of a key logger? Each correct answer represents a complete soluti
Which of the following are the main features of a key logger? Each correct answer represents a complete solution. Choose all that apply.
What will Mark do to accomplish the task?
Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network uses Network Access Protection (NAP). The company’s employees at the remote locations are connecting to the company’s network from their Windows Vista clients. Mark wants to ensure that the data transmission between a client computer andthe company’s network is as secure as possible.
What will Mark do to accomplish the task?
Which of the following is a potential risk if the travel agents will use their home computers for VPN access?
Mark work as a System Administrator for TechMart Inc. The company has a Windows-based network.
Mark wants to allow the remote travel agents to be able to access the corporate network so that they are free to check email and post appointments that are booked for the particular day.
Mark has decided to permit the travel agents to usetheir home computers but he is required to be assured that the information is not compromised by anyone because the security of client information is on the top priority for him.
Which of the following is a potential risk if the travel agents will use their home computers for VPN access?