The purpose of a digital certificate is to verify that a:
A Virtual Private Network (VPN) is a/an:
Alice and Bob are exchanging messages with each other. Chuck modifies the messages sent between Alice and Bob as shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.
The Active Directory controls, enforces, and assigns security policies and access rights for all users.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
What are two attributes that an email message may contain that should cause a user to question whether the message is a phishing attempt? (Choose two.)
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
You have a Windows 7 desktop computer, and you create a Standard User account for your roommate so that he can use the desktop from time to time. Your roommate has forgotten his password.
Which two actions can you take to reset the password? (Choose two.)
Match the authentication protocol with its description.
Instructions: To answer, drag the appropriate authentication protocol from the column on the left to its description on the right. Each authentication protocol may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Note: Each correct match is worth one point
You have a new computer and want to restrict other people from replacing the operating system.
Which action prevents a user from installing an alternate operating system by using physical media if the user has physical access to the computer?
You are preparing a local audit policy for your workstation. No auditing is enabled.
The settings of your policy are shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.
Windows Firewall is a built-in. host-based, stateless firewall.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
This question requires that you evaluate the underlined text to determine if it is correct.
To determine which action, if any, to take on an inbound message, anti-spam and antivirus recipient filtering inspects the IP address of the remote server that is trying to send messages.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed.” If the statement is incorrect, select the answer choice that makes the statement correct.
Physically securing servers prevents:
A user who receives a large number of emails selling prescription medicine is probably receiving pharming mail.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
You want to make your computer resistant to online hackers and malicious software.
What should you do?
This question requires that you evaluate the underlined text to determine if it is correct.
The first line of defense against attacks from the Internet is a software firewall.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.
The reason for implementing Service Set IDentifier (SSID) masking is to:
A digitally signed e-mail message:
The certificate of a secure public Web server on the Internet should be:
Which two are included in an enterprise antivirus program? (Choose two.)
Alice sends her password to the game server in plaintext. Chuck is able to observe her password as shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.
You suspect a user's computer is infected by a virus.
What should you do first?
Windows Server Update Services (WSUS) is a tool that:
Which two security settings can be controlled by using group policy? (Choose two.)