Which provides the highest level of security in a firewall?

Which provides the highest level of security in a firewall?A . Stateful inspectionB . Outbound packet filtersC . Stateless inspectionD . Inbound packet filtersView AnswerAnswer: A

November 29, 2019 No Comments READ MORE +

Which technology should you implement?

You need to limit the programs that can run on client computers to a specific list. Which technology should you implement?A . Windows Security CenterB . Security Accounts ManagerC . System Configuration UtilityD . AppLocker group policiesView AnswerAnswer: A

November 28, 2019 No Comments READ MORE +

How should you secure these passwords?

Many Internet sites that you visit require a user name and password. How should you secure these passwords?A . Save them to a text fileB . Enable session cachingC . Configure the browser to save passwordsD . Save them to an encrypted fileE . Reuse the same passwordView AnswerAnswer: D

November 28, 2019 No Comments READ MORE +

You are an intern for a company where your manager wants to be sure you understand the social engineering threats that may occur

HOTSPOT You are an intern for a company where your manager wants to be sure you understand the social engineering threats that may occur. Your manager emphasizes the principles of the Microsoft Defense-in-Depth Security Model shown in the following image: Use the drop-down menus to select the answer choice that...

November 27, 2019 No Comments READ MORE +

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point

HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. View AnswerAnswer: Explanation: Biometric devices, such as finger scanners consist of a reader or scanning device, Software that converts the scanned information into digital form and...

November 27, 2019 No Comments READ MORE +

The purpose of a digital certificate is to verify that a:

The purpose of a digital certificate is to verify that a:A . Public key belongs to a sender.B . Computer is virus-free.C . Private key belongs to a sender.D . Digital document is complete.View AnswerAnswer: A Explanation: In cryptography, a public key certificate (also known as a digital certificate or...

November 27, 2019 No Comments READ MORE +

Which security technology meets these requirements?

Your company requires that users type a series of characters to access the wireless network. The series of characters must meet the following requirements: - Contains more than 15 characters - Contains at least one letter - Contains at least one number - Contains at least one symbol Which security...

November 27, 2019 No Comments READ MORE +

The purpose of User Account Control (UAC) is to:

The purpose of User Account Control (UAC) is to:A . Encrypt the user's accountB . Limit the privileges of softwareC . Secure your data from corruptionD . Facilitate Internet filteringView AnswerAnswer: B Explanation: User Account Control (UAC) is a technology and security infrastructure introduced with Microsoft's Windows machines. It aims...

November 26, 2019 No Comments READ MORE +

Which server is best to use as a web server, considering the security and performance concerns?

Coho Winery wants to increase their web presence and hires you to set up a new web server. Coho already has servers for their business and would like to avoid purchasing a new one. Which server is best to use as a web server, considering the security and performance concerns?A...

November 26, 2019 No Comments READ MORE +

Role separation improves server security by:

Role separation improves server security by:A . Enforcing principle of least privilege.B . Installing applications on separate hard disks.C . Physically separating high security servers from other servers.D . Placing servers on separate VLANs.View AnswerAnswer: A

November 26, 2019 No Comments READ MORE +