You are preparing a local audit policy for your workstation. No auditing is enabled

HOTSPOT You are preparing a local audit policy for your workstation. No auditing is enabled. The settings of your policy are shown in the following image: Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point. View AnswerAnswer: Explanation: Dozens...

December 1, 2019 No Comments READ MORE +

Your supervisor asks you to review file permission settings on the application.bat file. You need to report which file system the file is on and the type of permission the file has

HOTSPOT Your supervisor asks you to review file permission settings on the application.bat file. You need to report which file system the file is on and the type of permission the file has. You review the application Properties dialog box shown in the following image: Use the drop-down menus to...

December 1, 2019 No Comments READ MORE +

You are at school and logged in to a Windows 7 computer using a standard user account

HOTSPOT You are at school and logged in to a Windows 7 computer using a standard user account. You need to change some of the properties of a desktop icon for an assignment. Your instructor provides you with an administrator username and password and asks you to do two tasks....

December 1, 2019 No Comments READ MORE +

What are two attributes that an email message may contain that should cause a user to question whether the message is a phishing attempt? (Choose two.)

What are two attributes that an email message may contain that should cause a user to question whether the message is a phishing attempt? (Choose two.)A . An image contained in the messageB . Spelling and grammar errorsC . Threats of losing serviceD . Use of bold and italicsView AnswerAnswer:...

November 30, 2019 No Comments READ MORE +

Which settings should you enable?

You are setting up Remote Desktop on your computer. Your computer is a member of a domain. Your firewall configuration is shown in the following image: You need to allow Remote Desktop to be able to get through your firewall for users on your company's network. Which settings should you...

November 30, 2019 No Comments READ MORE +

What is the quickest method to do this?

You are an intern at Wide World Importers and help manage 1000 workstations. All the workstations are members of an Active Domain. You need to push out an internal certificate to Internet Explorer on all workstations. What is the quickest method to do this?A . Local policyB . Logon scriptC...

November 30, 2019 No Comments READ MORE +

The primary purpose of Network Access Protection (NAP) is to prevent:

The primary purpose of Network Access Protection (NAP) is to prevent:A . Loss of data from client computers on a network.B . Non-compliant systems from connecting to a network.C . Users on a network from installing software.D . Unauthorized users from accessing a network.View AnswerAnswer: B Explanation: NAP enforces health...

November 30, 2019 No Comments READ MORE +

The Windows Firewall protects computers from unauthorized network connections.

The Windows Firewall protects computers from unauthorized network connections. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.A . Email virusesB . Phishing scamsC . Unencrypted network accessD . No change is...

November 29, 2019 No Comments READ MORE +

What is an example of non-propagating malicious code?

What is an example of non-propagating malicious code?A . A back doorB . A hoaxC . A Trojan horseD . A wormView AnswerAnswer: A

November 29, 2019 No Comments READ MORE +

A user who receives a large number of emails selling prescription medicine is probably receiving pharming mail.

A user who receives a large number of emails selling prescription medicine is probably receiving pharming mail. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.A . MalwareB . Spoofed mailC ....

November 29, 2019 No Comments READ MORE +