<< Prev Question Next Question >>

Question 4/81

Humongous Insurance needs to set up a domain controller in a branch office. Unfortunately, the server cannot be sufficiently secured from access by employees in that office, so the company is installing a Primary Domain Controller.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (81q)
Question 1: A user who receives a large number of emails selling prescri...
Question 2: What is a service set identifier (SSID)?...
Question 3: To prevent users from copying data to removable media, you s...
Question 4: Humongous Insurance needs to set up a domain controller in a...
Question 5: Which two are included in an enterprise antivirus program? (...
Question 6: Shredding documents helps prevent:...
Question 7: A brute force attack:
Question 8: This question requires that you evaluate the underlined text...
Question 9: The purpose of Microsoft Baseline Security Analyzer is to:...
Question 10: Passwords that contain recognizable words are vulnerable to ...
Question 11: A digitally signed e-mail message:...
Question 12: Dumpster diving refers to a physical threat that a hacker mi...
Question 13: You are setting up Remote Desktop on your computer. Your com...
Question 14: You are volunteering at an organization that gets a brand ne...
Question 15: You sign up for an online bank account. Every 6 months, the ...
Question 16: To protect systems from buffer overflow errors, you can use:...
Question 17: Your password is 1Vu*cI!8sT. Which attack method is your pas...
Question 18: E-mail bombing attacks a specific entity by:...
Question 19: Which three elements does HTTPS encrypt? (Choose three.)...
Question 20: Setting a minimum password age restricts when users can:...
Question 21: You need to hide internal IP addresses from the Internet whi...
Question 22: To implement WPA2 Enterprise, you would need a/an:...
Question 23: Coho Winery wants to increase their web presence and hires y...
Question 24: You need to prevent unauthorized users from reading a specif...
Question 25: Email spoofing:
Question 26: A group of users has access to Folder A and all of its conte...
Question 27: You are an intern at Litware, Inc. Your manager asks you to ...
Question 28: What are three major attack vectors that a social engineerin...
Question 29: This question requires that you evaluate the underlined text...
Question 30: The primary purpose of Network Access Protection (NAP) is to...
Question 31: This question requires that you evaluate the underlined text...
Question 32: You need to be able to gather information about a running pr...
Question 33: Windows Firewall is a built-in. host-based, stateless firewa...
Question 34: To keep third-party content providers from tracking your mov...
Question 35: What are two attributes that an email message may contain th...
Question 36: A network sniffer is software or hardware that:...
Question 37: You are an intern and are working remotely. You need a solut...
Question 38: Which attack listens to network traffic of a computer resour...
Question 39: Many Internet sites that you visit require a user name and p...
Question 40: The WPA2 PreShared Key (PSK) is created by using a passphras...
Question 41: Before you deploy Network Access Protection (NAP), you must ...
Question 42: The purpose of Windows Server Update Services (WSUS) is to:...
1 commentQuestion 43: Which password attack uses all possible alpha numeric combin...
Question 44: What are two reasons to implement VLANs? (Choose two.)...
Question 45: You have an application that uses IPsec to secure communicat...
Question 46: Phishing is an attempt to:
Question 47: You create a web server for your school. When users visit yo...
Question 48: The Active Directory controls, enforces, and assigns securit...
Question 49: You are an intern at Wide World Importers and help manage 10...
Question 50: You have a Windows 2012 R2 Server. Security logging is enabl...
Question 51: You would implement a wireless intrusion prevention system t...
Question 52: The name of a particular wireless LAN that is broadcast on a...
Question 53: You are trying to establish communications between a client ...
Question 54: Which is a special folder permission?...
Question 55: In Internet Explorer 8, the InPrivate Browsing feature preve...
Question 56: You have a Windows 7 desktop computer, and you create a Stan...
Question 57: Cookies impact security by enabling: (Choose two.)...
Question 58: How does the sender policy framework (SPF) aim to reduce spo...
Question 59: Which type of password attack attempts to guess passwords by...
Question 60: Bridging is a process of sending packets from source to dest...
Question 61: Keeping a server updated:
Question 62: Which enables access to all of the logged-in user's capabili...
Question 63: What is a common method for password collection?...
Question 64: When conducting a security audit the first step is to:...
Question 65: What are two examples of physical site security? (Choose two...
Question 66: Which type of firewall allows for inspection of all characte...
Question 67: A process by which DNS zone data is obtained by an attacker ...
Question 68: The manager of a coffee shop hires you to securely set up Wi...
Question 69: The certificate of a secure public Web server on the Interne...
Question 70: The reason for implementing Service Set IDentifier (SSID) ma...
Question 71: You need to grant a set of users write access to a file on a...
Question 72: The purpose of a digital certificate is to verify that a:...
Question 73: Which technology enables you to filter communications betwee...
Question 74: The company that you work for wants to set up a secure netwo...
Question 75: Basic security questions used to reset a password are suscep...
Question 76: Which is the minimum requirement to create BitLocker-To-Go m...
Question 77: Where should you lock up the backup tapes for your servers?...
Question 78: You create a new file in a folder that has inheritance enabl...
Question 79: Which provides the highest level of security in a firewall?...
Question 80: You are trying to connect to an FTP server on the Internet f...
Question 81: What displays a user's level of access to a particular file ...