Which provides the highest level of security in a firewall?
Which provides the highest level of security in a firewall?A . Stateful inspectionB . Outbound packet filtersC . Stateless inspectionD . Inbound packet filtersView AnswerAnswer: A
Which technology should you implement?
You need to limit the programs that can run on client computers to a specific list. Which technology should you implement?A . Windows Security CenterB . Security Accounts ManagerC . System Configuration UtilityD . AppLocker group policiesView AnswerAnswer: A
How should you secure these passwords?
Many Internet sites that you visit require a user name and password. How should you secure these passwords?A . Save them to a text fileB . Enable session cachingC . Configure the browser to save passwordsD . Save them to an encrypted fileE . Reuse the same passwordView AnswerAnswer: D
You are an intern for a company where your manager wants to be sure you understand the social engineering threats that may occur
HOTSPOT You are an intern for a company where your manager wants to be sure you understand the social engineering threats that may occur. Your manager emphasizes the principles of the Microsoft Defense-in-Depth Security Model shown in the following image: Use the drop-down menus to select the answer choice that...
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point
HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. View AnswerAnswer: Explanation: Biometric devices, such as finger scanners consist of a reader or scanning device, Software that converts the scanned information into digital form and...
The purpose of a digital certificate is to verify that a:
The purpose of a digital certificate is to verify that a:A . Public key belongs to a sender.B . Computer is virus-free.C . Private key belongs to a sender.D . Digital document is complete.View AnswerAnswer: A Explanation: In cryptography, a public key certificate (also known as a digital certificate or...
Which security technology meets these requirements?
Your company requires that users type a series of characters to access the wireless network. The series of characters must meet the following requirements: - Contains more than 15 characters - Contains at least one letter - Contains at least one number - Contains at least one symbol Which security...
The purpose of User Account Control (UAC) is to:
The purpose of User Account Control (UAC) is to:A . Encrypt the user's accountB . Limit the privileges of softwareC . Secure your data from corruptionD . Facilitate Internet filteringView AnswerAnswer: B Explanation: User Account Control (UAC) is a technology and security infrastructure introduced with Microsoft's Windows machines. It aims...
Which server is best to use as a web server, considering the security and performance concerns?
Coho Winery wants to increase their web presence and hires you to set up a new web server. Coho already has servers for their business and would like to avoid purchasing a new one. Which server is best to use as a web server, considering the security and performance concerns?A...
Role separation improves server security by:
Role separation improves server security by:A . Enforcing principle of least privilege.B . Installing applications on separate hard disks.C . Physically separating high security servers from other servers.D . Placing servers on separate VLANs.View AnswerAnswer: A