What is a common method for password collection?
D
Which password attack uses all possible alpha numeric combinations?
C
Email spoofing:
A
Explanation:
References:
https://searchsecurity.techtarget.com/definition/email-spoofing
What does NAT do?
C
Explanation:
Reference: http://en.wikipedia.org/wiki/Network_address_translation
The primary purpose of Network Access Protection (NAP) is to prevent:
B
Explanation:
NAP enforces health policies by inspecting and assessing the health of client computers, restricting network access when
client computers are noncompliant with health policy, and remediating noncompliant client computers to bring them into
compliance with health policy before they are granted full network access. NAP enforces health policies on client computers
that are attempting to connect to a network; NAP also provides ongoing health compliance enforcement while a client
computer is connected to a network.
Reference: http://technet.microsoft.com/en-us/library/cc754378(v=ws.10).aspx
A mail system administrator scans for viruses in incoming emails to increase the speed of mail processing.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the
underlined text makes the statement correct.
A
Which is a special folder permission?
D
Explanation:
Reference: http://support.microsoft.com/kb/308419
Which provides the highest level of security in a firewall?
A
HOTSPOT
You are helping your classmates with their password settings.
Instructions: For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Explanation:
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/ minimum-password-length
You have two servers that run Windows Server. All drives on both servers are formatted by using NTFS.
You move a file from one server to the other server. The file's permissions in the new location will:
C
Explanation:
You can modify how Windows Explorer handles permissions when objects are copied or moved to another NTFS volume.
When you copy or move an object to another volume, the object inherits the permissions of its new folder.