Which password attack uses all possible alpha numeric combinations?
Which password attack uses all possible alpha numeric combinations?A . Social engineeringB . Brute force attackC . Dictionary attackD . Rainbow table attackView AnswerAnswer: C
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point
HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. View AnswerAnswer:
What are three examples of two-factor authentication? (Choose three.)
What are three examples of two-factor authentication? (Choose three.)A . A fingerprint and a patternB . A password and a smart cardC . A username and a passwordD . A password and a pin numberE . A pin number and a debit cardView AnswerAnswer: ABE Explanation: At minimum two-factor authentication...
Before you deploy Network Access Protection (NAP), you must install:
Before you deploy Network Access Protection (NAP), you must install:A . Internet Information Server (IIS)B . Network Policy Server (NPS)C . Active Directory Federation ServicesD . Windows Update ServiceView AnswerAnswer: B Explanation: Reference: http://technet.microsoft.com/en-us/library/bb681008.aspx
Physically securing servers prevents:
Physically securing servers prevents:A . TheftB . Compromise of the certificate chainC . Man-in-the middle attacksD . Denial of Service attacksView AnswerAnswer: A
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point
HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. View AnswerAnswer:
Keeping a server updated:
Keeping a server updated:A . Maximizes network efficiencyB . Fixes security holesC . Speeds up folder accessD . Synchronizes the serverView AnswerAnswer: B
Passwords that contain recognizable words are vulnerable to a:
Passwords that contain recognizable words are vulnerable to a:A . Denial of Service attackB . Hashing attackC . Dictionary attackD . Replay attackView AnswerAnswer: C Explanation: A dictionary attack is a method of breaking into a password-protected computer or server by systematically entering every word in a dictionary as a...
You are volunteering at an organization that gets a brand new web server. To make the server more secure, you should add a second administrator account.
You are volunteering at an organization that gets a brand new web server. To make the server more secure, you should add a second administrator account. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes...
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. View AnswerAnswer: