<< Prev Question Next Question >>

Question 59/74

The Windows Firewall protects computers from unauthorized network connections.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (74q)
Question 1: Which three elements does HTTPS encrypt? (Choose three.)...
Question 2: You are an intern at Litware, Inc. Your manager asks you to ...
Question 3: Which provides the highest level of security in a firewall?...
Question 4: Which two security settings can be controlled by using group...
Question 5: The purpose of Microsoft Baseline Security Analyzer is to:...
Question 6: This question requires that you evaluate the underlined text...
Question 7: When conducting a security audit the first step is to:...
Question 8: Creating MD5 hash for files is an example of ensuring what?...
Question 9: What are two examples of physical site security? (Choose two...
Question 10: What is a service set identifier (SSID)?...
Question 11: Which is the minimum requirement to create BitLocker-To-Go m...
Question 12: Passwords that contain recognizable words are vulnerable to ...
Question 13: You are an intern at Wide World Importers and help manage 10...
Question 14: The WPA2 PreShared Key (PSK) is created by using a passphras...
Question 15: How does the sender policy framework (SPF) aim to reduce spo...
Question 16: E-mail spoofing:
Question 17: You create a new file in a folder that has inheritance enabl...
Question 18: The primary purpose of Network Access Protection (NAP) is to...
Question 19: You need to grant a set of users write access to a file on a...
Question 20: E-mail bombing attacks a specific entity by:...
Question 21: Coho Winery wants to increase their web presence and hires y...
Question 22: What are two attributes that an email message may contain th...
Question 23: You suspect a user's computer is infected by a virus. What s...
Question 24: Windows Firewall is a built-in. host-based, stateless firewa...
Question 25: The default password length for a Windows Server domain cont...
Question 26: The purpose of User Account Control (UAC) is to:...
Question 27: Role separation improves server security by:...
Question 28: To implement WPA2 Enterprise, you would need a/an:...
Question 29: Account lockout policies are used to prevent which type of s...
Question 30: Cookies impact security by enabling: (Choose two.)...
Question 31: The manager of a coffee shop hires you to securely set up Wi...
Question 32: You have an application that uses IPsec to secure communicat...
Question 33: A process by which DNS zone data is obtained by an attacker ...
Question 34: Phishing is an attempt to:
Question 35: A digitally signed e-mail message:...
Question 36: Where should you lock up the backup tapes for your servers?...
Question 37: Which attack listens to network traffic of a computer resour...
Question 38: Which is a special folder permission?...
Question 39: You are trying to connect to an FTP server on the Internet f...
Question 40: Humongous Insurance is an online healthcare insurance compan...
Question 41: You need to hide internal IP addresses from the Internet whi...
Question 42: Basic security questions used to reset a password are suscep...
Question 43: A network sniffer is software or hardware that:...
Question 44: Shredding documents helps prevent:...
Question 45: Which two characteristics should you recommend for a user's ...
Question 46: You have a Windows 7 desktop computer, and you create a Stan...
Question 47: Password history policies are used to prevent:...
Question 48: Before you deploy Network Access Protection (NAP), you must ...
Question 49: A mail system administrator scans for viruses in incoming em...
Question 50: The Graphic Design Institute hires you to help them set up a...
Question 51: What is the standard or basic collection of NTFS permissions...
Question 52: Which type of firewall allows for inspection of all characte...
Question 53: A brute force attack:
Question 54: Keeping a server updated:
Question 55: Which technology enables you to filter communications betwee...
Question 56: The Active Directory controls, enforces, and assigns securit...
Question 57: An attorney hires you to increase the wireless network secur...
Question 58: Many Internet sites that you visit require a user name and p...
Question 59: The Windows Firewall protects computers from unauthorized ne...
Question 60: In Internet Explorer 8, the InPrivate Browsing feature preve...
Question 61: You sign up for an online bank account. Every 6 months, the ...
Question 62: Setting a minimum password age restricts when users can:...
Question 63: The purpose of a digital certificate is to verify that a:...
Question 64: You are trying to establish communications between a client ...
Question 65: What is the primary advantage of using Active Directory Inte...
Question 66: A malicious user who intercepts and modifies communications ...
Question 67: You want to make your computer resistant to online hackers a...
Question 68: Which two are included in an enterprise antivirus program? (...
Question 69: You create a web server for your school. When users visit yo...
Question 70: Which enables access to all of the logged-in user's capabili...
Question 71: Your password is 1Vu*cI!8sT. Which attack method is your pas...
Question 72: You need to install a domain controller in a branch office. ...
Question 73: You need to be able to gather information about a running pr...
Question 74: The purpose of Windows Server Update Services (WSUS) is to:...