You are volunteering at an organization that gets a brand new web server. To make the server more secure, you should add a second administrator account. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
You are volunteering at an organization that gets a brand new web server. To make the server more secure, you should add a second administrator account. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes...
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point
HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. View AnswerAnswer:
The purpose of User Account Control (UAC) is to:
The purpose of User Account Control (UAC) is to:A . Encrypt the user's accountB . Limit the privileges of softwareC . Secure your data from corruptionD . Facilitate Internet filteringView AnswerAnswer: B Explanation: User Account Control (UAC) is a technology and security infrastructure introduced with Microsoft's Windows machines. It aims...
Which technology should you implement?
You need to limit the programs that can run on client computers to a specific list. Which technology should you implement?A . Windows Security CenterB . Security Accounts ManagerC . System Configuration UtilityD . AppLocker group policiesView AnswerAnswer: A
Which password attack uses all possible alpha numeric combinations?
Which password attack uses all possible alpha numeric combinations?A . Social engineeringB . Brute force attackC . Dictionary attackD . Rainbow table attackView AnswerAnswer: C
The purpose of a digital certificate is to verify that a:
The purpose of a digital certificate is to verify that a:A . Public key belongs to a sender.B . Computer is virus-free.C . Private key belongs to a sender.D . Digital document is complete.View AnswerAnswer: A Explanation: In cryptography, a public key certificate (also known as a digital certificate or...
In Internet Explorer 8, the In Private Browsing feature prevents:
In Internet Explorer 8, the In Private Browsing feature prevents:A . Unauthorized private data input.B . Unencrypted communication between the client computer and the server.C . User credentials from being sent over the Internet.D . Any session data from being stored on the computer.View AnswerAnswer: D Explanation: Reference: http://windows.microsoft.com/en-us/windows/what-is-inprivate-browsing
You are preparing a local audit policy for your workstation. No auditing is enabled
HOTSPOT You are preparing a local audit policy for your workstation. No auditing is enabled. The settings of your policy are shown in the following image: Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point. View AnswerAnswer: Explanation: Dozens...
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point
HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. View AnswerAnswer:
Windows Firewall is a built-in. host-based, stateless firewall. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
Windows Firewall is a built-in. host-based, stateless firewall. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.A . StatefulB . Network layerC . Packet filterD . No change is neededView AnswerAnswer: A