For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point

HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. View AnswerAnswer:

December 3, 2019 No Comments READ MORE +

As a general practice of hardening the server, you start by performing which two tasks?

The Graphic Design Institute hires you to help them set up a server for their 20-person team. As a general practice of hardening the server, you start by performing which two tasks? (Choose two.)A . Disable the guest account.B . Rename the admin account.C . Remove the account lockout policy.D...

December 3, 2019 No Comments READ MORE +

What is the standard or basic collection of NTFS permissions?

What is the standard or basic collection of NTFS permissions?A . Read and execute, read, write, full control, modify, list folder contentsB . Change permissions, read permissions, write permissionsC . Read attributes, list folder/read data, traverse folder/execute fileD . Create files/write data, create folders/append data, take ownershipView AnswerAnswer: A Explanation:...

December 3, 2019 No Comments READ MORE +

What should you do to fix this problem?

You create a web server for your school. When users visit your site, they get a certificate error that says your site is not trusted. What should you do to fix this problem?A . Install a certificate from a trusted Certificate Authority (CA).B . Use a digital signature.C . Generate...

December 3, 2019 No Comments READ MORE +

Bridging is a process of sending packets from source to destination on OSI layer 3.

Bridging is a process of sending packets from source to destination on OSI layer 3. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.A . RoutingB . SwitchingC . RepeatingD . No...

December 3, 2019 No Comments READ MORE +

Account lockout policies are used to prevent which type of security attack?

Account lockout policies are used to prevent which type of security attack?A . Brute force attacksB . Users sharing passwordsC . Social engineeringD . Passwords being reused immediatelyView AnswerAnswer: A

December 2, 2019 No Comments READ MORE +

In Internet Explorer 8, the InPrivate Browsing feature prevents:

In Internet Explorer 8, the InPrivate Browsing feature prevents:A . Unauthorized private data input.B . Unencrypted communication between the client computer and the server.C . User credentials from being sent over the Internet.D . Any session data from being stored on the computer.View AnswerAnswer: D Explanation: Reference: http://windows.microsoft.com/en-us/windows/what-is-inprivate-browsing

December 2, 2019 No Comments READ MORE +

The purpose of Microsoft Baseline Security Analyzer is to:

The purpose of Microsoft Baseline Security Analyzer is to:A . List system vulnerabilities.B . Apply all current patches to a server.C . Set permissions to a default level.D . Correct a company's security state.View AnswerAnswer: A

December 2, 2019 No Comments READ MORE +

What does NAT do?

What does NAT do?A . It encrypts and authenticates IP packets.B . It provides caching and reduces network traffic.C . It translates public IP addresses to private addresses and vice versa.D . It analyzes incoming and outgoing traffic packets.View AnswerAnswer: C Explanation: Reference: http://en.wikipedia.org/wiki/Network_address_translation

December 2, 2019 No Comments READ MORE +

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point

HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. View AnswerAnswer:

December 1, 2019 No Comments READ MORE +