You are preparing a local audit policy for your workstation. No auditing is enabled
HOTSPOT You are preparing a local audit policy for your workstation. No auditing is enabled. The settings of your policy are shown in the following image: Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point. View AnswerAnswer: Explanation: Dozens...
Your supervisor asks you to review file permission settings on the application.bat file. You need to report which file system the file is on and the type of permission the file has
HOTSPOT Your supervisor asks you to review file permission settings on the application.bat file. You need to report which file system the file is on and the type of permission the file has. You review the application Properties dialog box shown in the following image: Use the drop-down menus to...
You are at school and logged in to a Windows 7 computer using a standard user account
HOTSPOT You are at school and logged in to a Windows 7 computer using a standard user account. You need to change some of the properties of a desktop icon for an assignment. Your instructor provides you with an administrator username and password and asks you to do two tasks....
What are two attributes that an email message may contain that should cause a user to question whether the message is a phishing attempt? (Choose two.)
What are two attributes that an email message may contain that should cause a user to question whether the message is a phishing attempt? (Choose two.)A . An image contained in the messageB . Spelling and grammar errorsC . Threats of losing serviceD . Use of bold and italicsView AnswerAnswer:...
Which settings should you enable?
You are setting up Remote Desktop on your computer. Your computer is a member of a domain. Your firewall configuration is shown in the following image: You need to allow Remote Desktop to be able to get through your firewall for users on your company's network. Which settings should you...
What is the quickest method to do this?
You are an intern at Wide World Importers and help manage 1000 workstations. All the workstations are members of an Active Domain. You need to push out an internal certificate to Internet Explorer on all workstations. What is the quickest method to do this?A . Local policyB . Logon scriptC...
The primary purpose of Network Access Protection (NAP) is to prevent:
The primary purpose of Network Access Protection (NAP) is to prevent:A . Loss of data from client computers on a network.B . Non-compliant systems from connecting to a network.C . Users on a network from installing software.D . Unauthorized users from accessing a network.View AnswerAnswer: B Explanation: NAP enforces health...
The Windows Firewall protects computers from unauthorized network connections.
The Windows Firewall protects computers from unauthorized network connections. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.A . Email virusesB . Phishing scamsC . Unencrypted network accessD . No change is...
What is an example of non-propagating malicious code?
What is an example of non-propagating malicious code?A . A back doorB . A hoaxC . A Trojan horseD . A wormView AnswerAnswer: A
A user who receives a large number of emails selling prescription medicine is probably receiving pharming mail.
A user who receives a large number of emails selling prescription medicine is probably receiving pharming mail. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.A . MalwareB . Spoofed mailC ....