To prevent users from copying data to removable media, you should:
To prevent users from copying data to removable media, you should:A . Lock the computer casesB . Apply a group policyC . Disable copy and pasteD . Store media in a locked roomView AnswerAnswer: B Explanation: Reference: http://blogs.technet.com/b/askds/archive/2008/08/25/removable-storage-group-policy-and-windows-server-2008-and-windows-vista.aspx
Which enables you to change the permissions on a folder?
Which enables you to change the permissions on a folder?A . Take ownershipB . Extended attributesC . AuditingD . ModifyView AnswerAnswer: D
Before you deploy Network Access Protection (NAP), you must install:
Before you deploy Network Access Protection (NAP), you must install:A . Internet Information Server (IIS)B . Network Policy Server (NPS)C . Active Directory Federation ServicesD . Windows Update ServiceView AnswerAnswer: B Explanation: Reference: http://technet.microsoft.com/en-us/library/bb681008.aspx
What are three examples of two-factor authentication? (Choose three.)
What are three examples of two-factor authentication? (Choose three.)A . A fingerprint and a patternB . A password and a smart cardC . A username and a passwordD . A password and a pin numberE . A pin number and a debit cardView AnswerAnswer: A, B, E Explanation: At minimum...
Which is the minimum requirement to create BitLocker-To-Go media on a client computer?
Which is the minimum requirement to create BitLocker-To-Go media on a client computer?A . Windows XP Professional Service Pack 3B . Windows Vista Enterprise EditionC . Windows 7 Enterprise EditionD . Windows 2000 Professional Service Pack 4View AnswerAnswer: A
The purpose of Microsoft Baseline Security Analyzer is to:
The purpose of Microsoft Baseline Security Analyzer is to:A . List system vulnerabilities.B . Apply all current patches to a server.C . Set permissions to a default level.D . Correct a company's security state.View AnswerAnswer: A
The Windows Firewall protects computers from unauthorized network connections. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.
The Windows Firewall protects computers from unauthorized network connections. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.A . Email virusesB . Phishing scamsC . Unencrypted network accessD . No change is...
What should you do first?
A group of users has access to Folder A and all of its contents. You need to prevent some of the users from accessing a subfolder inside Folder A. What should you do first? A. Disable folder sharing B. Hide the folder C. Change the owner D. Block inheritanceView AnswerAnswer:...
You are an intern for a company where your manager wants to be sure you understand the social engineering threats that may occur
HOTSPOT You are an intern for a company where your manager wants to be sure you understand the social engineering threats that may occur. Your manager emphasizes the principles of the Microsoft Defense-in-Depth Security Model shown in the following image: Use the drop-down menus to select the answer choice that...
What is the quickest method to do this?
You are an intern at Wide World Importers and help manage 1000 workstations. All the workstations are members of an Active Domain. You need to push out an internal certificate to Internet Explorer on all workstations. What is the quickest method to do this?A . Local policyB . Logon scriptC...