Which of the Windows security component is responsible for controlling access of a user to Windows resources?
Which of the Windows security component is responsible for controlling access of a user to Windows resources?A . Network Logon Service (Netlogon) B. Security Accounts Manager (SAM) C. Security Reference Monitor (SRM) D. Local Security Authority Subsystem (LSASS)View AnswerAnswer: D
Which IEEE standard does wireless network use?
Which IEEE standard does wireless network use?A . 802.11 B. 802.18 C. 802.9 D. 802.10View AnswerAnswer: A
Harry has sued the company claiming they made his personal information public on a social networking site in the United States. The company denies the allegations and consulted a/an _______ for legal advice to defend them against this allegation.
Harry has sued the company claiming they made his personal information public on a social networking site in the United States. The company denies the allegations and consulted a/an _______ for legal advice to defend them against this allegation.A . Evidence Manager B. Incident Handler C. Attorney D. PR SpecialistView...
What layer of the OSI model do IPsec tunnels function on?
Liza was told by her network administrator that they will be implementing IPsec VPN tunnels to connect the branch locations to the main office. What layer of the OSI model do IPsec tunnels function on?A . The data link layer B. The session layer C. The network layer D. The...
Which of the following command allows Sophie to do so?
Sophie has been working as a Windows network administrator at an MNC over the past 7 years. She wants to check whether SMB1 is enabled or disabled. Which of the following command allows Sophie to do so?A . Get-WindowsOptionalFeatures -Online -FeatureNames SMB1Protocol B. Get-WindowsOptionalFeature -Online -FeatureName SMB1Protocol C. Get-WindowsOptionalFeature -Online...
Michael decides to view the-----------------to track employee actions on the organization's network.
Michael decides to view the-----------------to track employee actions on the organization's network.A . Firewall policy B. Firewall log C. Firewall settings D. Firewall rule setView AnswerAnswer: B
What type of network security approach is Daniel adopting?
Daniel is monitoring network traffic with the help of a network monitoring tool to detect any abnormalities. What type of network security approach is Daniel adopting?A . Preventative B. Reactive C. Retrospective D. Defense-in-depthView AnswerAnswer: B
Fargo would like to eliminate it; what command should he execute?
Fargo, head of network defense at Globadyne Tech, has discovered an undesirable process in several Linux systems, which causes machines to hang every 1 hour. Fargo would like to eliminate it; what command should he execute?A . # update-rc.d -f [service name] remove B. # service [service name] stop C....
What layer of network defense-in-depth strategy is he trying to follow?
Damian is the chief security officer of Enigma Electronics. To block intruders and prevent any environmental accidents, he needs to set a two-factor authenticated keypad lock at the entrance, rig a fire suppression system, and link any video cameras at various corridors to view the feeds in the surveillance room....
Which command will John use to enable NetFlow on an interface?
John, the network administrator and he wants to enable the NetFlow feature in Cisco routers to collect and monitor the IP network traffic passing through the router. Which command will John use to enable NetFlow on an interface?A . Router(Config-if) # IP route - cache flow B. Router# Netmon enable...