What is a common method for password collection?
D
Which password attack uses all possible alpha numeric combinations?
C
Email spoofing:
A
Explanation:
References:
https://searchsecurity.techtarget.com/definition/email-spoofing
What does NAT do?
C
Explanation:
Reference: http://en.wikipedia.org/wiki/Network_address_translation
The primary purpose of Network Access Protection (NAP) is to prevent:
B
Explanation:
NAP enforces health policies by inspecting and assessing the health of client computers, restricting network access when
client computers are noncompliant with health policy, and remediating noncompliant client computers to bring them into
compliance with health policy before they are granted full network access. NAP enforces health policies on client computers
that are attempting to connect to a network; NAP also provides ongoing health compliance enforcement while a client
computer is connected to a network.
Reference: http://technet.microsoft.com/en-us/library/cc754378(v=ws.10).aspx
A mail system administrator scans for viruses in incoming emails to increase the speed of mail processing.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the
underlined text makes the statement correct.
A
Which is a special folder permission?
D
Explanation:
Reference: http://support.microsoft.com/kb/308419
Which provides the highest level of security in a firewall?
A
HOTSPOT
You are helping your classmates with their password settings.
Instructions: For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Explanation:
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/ minimum-password-length
You have two servers that run Windows Server. All drives on both servers are formatted by using NTFS.
You move a file from one server to the other server. The file's permissions in the new location will:
C
Explanation:
You can modify how Windows Explorer handles permissions when objects are copied or moved to another NTFS volume.
When you copy or move an object to another volume, the object inherits the permissions of its new folder.
Your password is 1Vu*cI!8sT.
Which attack method is your password vulnerable to?
A
Shredding documents helps prevent:
B
Explanation:
Reference: http://technet.microsoft.com/en-us/library/cc875841.aspx
Malicious software designed to collect personally identifiable information is referred to as :
A
The name of a particular wireless LAN that is broadcast on a network is referred to as a:
D
HOTSPOT You are at school and logged in to a Windows 7 computer using a standard user account.
You need to change some of the properties of a desktop icon for an assignment. Your instructor provides you with an
administrator username and password and asks you to do two tasks.
When you open the Need Admin Access Properties window, you see the following image:
Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one
point.
Hot Area: