You need to ensure that all security updates have been applied to one of your servers. What should you use?
You want to ensure that mobile clients receive timely operating system updates. Some clients rarely connect to the internal business network. Which should you use?
What is the minimum shared folder permission that is required for a user to delete a file?
What is the advantage of preventing a wireless access point (WAP) from broadcasting its service set identifier (SSID)?
For what reason is physical security extremely important with laptops and other mobile devices?
A wireless network that implements WEP:
Which is the best way to prevent security compromises through social engineering?
In e-mail, spoofing occurs when:
In which situation would you typically use a stand-alone certificate authority (CA) in your public key infrastructure (PKI) design?
You want to provide public access to a Web server. Visitors to the Web server should not have access to your internal network. You need to configure:
You administer your company's Windows Server 2012 R2 file server. The file server has two NTFS data volumes, D: and E:. You move a file from drive D: to drive E:. What happens to the file's original permissions?
You are a network administrator for your organization. The corporate help desk receive several customer complaints that visits to your organization's public website redirected them to a known malware site. You need to mitigate this type of network attack. Which technology should you implement?
Which protocol can centralize authentication for dial-up, Virtual Private Network (VPN), and IEEE 802.11 Wi-Fi access connections?
When you enable User Access Control (UAC):
- A. All standard and administrative users run standard applications with standard application permissions
You have a server running Windows Server 2008. You want to deploy NAP to enforce compliance for client computers on the network. Which client operating systems are supported?
What is the primary purpose of a firewall?
You are the security administrator for your company. All users have company-issued laptop computers running Windows 10 Enterprise Edition. The corporate network is organized as a single Active Directory Domain Services (AD DS) domain. You need to enforce a new security policy that requires that all locally cached corporate network data is protected against unauthorized access. What should you do?
All users have been denied all permissions to a file. You need to access the file as quickly as possible. You are logged on as an administrator. What should you do first?
Which firewall inspection method logs outgoing connections and checks incoming traffic against that log?
Object access auditing is used to monitor:
You need to create a password policy to ensure that domain account passwords must be reset every two weeks. What should you do?
You have a training room with 10 computers. You need to be able to control what software can be run by specific users logging on to the computers. What should you use? (Each correct answer presents a complete solution. Choose two.)
Monitoring network communications to collect information about the network and collect the content of network packets is known as:
You normally log on as a standard user. You need to occasionally run programs that require administrator privileges. You want to keep the potential security risk to a minimum. What should you do?
What are two features of a public key in asymmetric encryption? (Each correct answer presents a complete solution. Choose two.)
Which would be an example of a social engineering attack?
What benefit do SPF records provide??
Creating an antivirus quarantine area causes:
Which is a feature of the SmartScreen filter?
Courses Offered In This Certification