Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. All servers are configured to enforce AppLocker policies. You install a server named Server1. On Server1, you install an application named App1.exe in a folder located on C:App1. You have two domain groups named Group1 and Group2.A user named User1 is a member of Group1 and Group2. You create a Group Policy object (GPO) named GPO1. You link GPO1 to contoso.com

HOTSPOT Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. All servers are configured to enforce AppLocker policies. You install a server named Server1. On Server1, you install an application named App1.exe in a folder located on C:App1. You have two domain...

November 13, 2018 No Comments READ MORE +

What is the primary role of smartcards in a PKI?

What is the primary role of smartcards in a PKI?A .  Transparent renewal of user keysB .  Easy distribution of the certificates between the usersC .  Fast hardware encryption of the raw dataD .  Tamper resistant, mobile storage and application of private keys of the usersView AnswerAnswer: D Explanation: HARRIS,...

November 13, 2018 No Comments READ MORE +

What is the maximum size of a virtual hard disk?

What is the maximum size of a virtual hard disk?A . 2 terabytesB . 5 terabytesC . 16 terabytesD . 500GBView AnswerAnswer: A

November 13, 2018 No Comments READ MORE +

Which of the following floors would be most appropriate to locate information processing facilities in a 6-stories building?

Which of the following floors would be most appropriate to locate information processing facilities in a 6-stories building?A .  BasementB .  Ground floorC .  Third floorD .  Sixth floorView AnswerAnswer: C Explanation: You data center should be located in the middle of the facility or the core of a building to provide...

November 13, 2018 No Comments READ MORE +

Which two statements about firewalls are true?

Which two statements about firewalls are true?A . They can be used with an intrusion prevention systemB . They can limit unauthorized user access to protect dataC . Each wireless access point requires its own firewallD . They must be placed only at locations where the private network connects to...

November 13, 2018 No Comments READ MORE +

Which two commands should you run?

You have a computer that runs Window 10. The computer starts in UEFI mode and has a 64-bit processor. You insert a USB key in the computer. The USB key has a drive letter of F. You need to ensure that you can start the computer by using Windows Preinstallation...

November 13, 2018 No Comments READ MORE +

Which two statements are true regarding a Plan in Developer Portal?

Which two statements are true regarding a Plan in Developer Portal?A . Plans cannot have multiple rate limits set per operation.B . The burst limit feature is available only through Micro Gateway.C . A Plan is a collection of API operations or subsets of operations from one or more APIs.D...

November 13, 2018 No Comments READ MORE +

In performing a risk analysis, which factor(s) should a financial institution review?

In performing a risk analysis, which factor(s) should a financial institution review?A . The level of its gross revenueB . Recent regulatory actions against financial institutions of comparable sizeC . Its customer base, location, products and servicesD . The adequacy and completeness of its STR filingsView AnswerAnswer: C

November 13, 2018 No Comments READ MORE +

Which expression creates a filter on a host IP address or name?

Which expression creates a filter on a host IP address or name?A . [src|dst] host <host host >B . [tcp|udp] [src|dst] port<port>C . ether [src|dst] host<ehost>D . gateway host <host>View AnswerAnswer: A Explanation: https://www.wireshark.org/docs/wsug_html_chunked/ChCapCaptureFilterSection.html

November 13, 2018 No Comments READ MORE +

Which three actions should you perform in sequence?

DRAG DROP You need to collect the required security logs. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. View AnswerAnswer: Explanation: Note: * Audit collection services (Box 1)...

November 13, 2018 No Comments READ MORE +