次へ>>

質問 1/74

An attorney hires you to increase the wireless network security for the law firm's office. The office has a very basic network, with just a modem and a router.
Which of these security modes offers the highest security?

コメントを発表する

あなたのメールアドレスは公開されません。必要な部分に * が付きます。

質問一覧「74問」
質問1 An attorney hires you to increase the wireless network secur...
質問2 What is a service set identifier (SSID)?...
質問3 Which two security settings can be controlled by using group...
質問4 Coho Winery wants to increase their web presence and hires y...
質問5 Which provides the highest level of security in a firewall?...
質問6 The Windows Firewall protects computers from unauthorized ne...
質問7 How does the sender policy framework (SPF) aim to reduce spo...
質問8 Account lockout policies are used to prevent which type of s...
質問9 You create a new file in a folder that has inheritance enabl...
質問10 To implement WPA2 Enterprise, you would need a/an:...
質問11 Which attack listens to network traffic of a computer resour...
質問12 In Internet Explorer 8, the InPrivate Browsing feature preve...
質問13 You want to make your computer resistant to online hackers a...
質問14 Before you deploy Network Access Protection (NAP), you must ...
質問15 Passwords that contain recognizable words are vulnerable to ...
質問16 You sign up for an online bank account. Every 6 months, the ...
質問17 Keeping a server updated:
質問18 Which technology enables you to filter communications betwee...
質問19 You are an intern at Wide World Importers and help manage 10...
質問20 What are two attributes that an email message may contain th...
質問21 The manager of a coffee shop hires you to securely set up Wi...
質問22 Your password is 1Vu*cI!8sT. Which attack method is your pas...
質問23 The WPA2 PreShared Key (PSK) is created by using a passphras...
質問24 Shredding documents helps prevent:...
質問25 Which enables access to all of the logged-in user's capabili...
質問26 The purpose of Windows Server Update Services (WSUS) is to:...
質問27 This question requires that you evaluate the underlined text...
質問28 E-mail spoofing:
質問29 The default password length for a Windows Server domain cont...
質問30 Which is a special folder permission?...
質問31 Which type of firewall allows for inspection of all characte...
質問32 You need to grant a set of users write access to a file on a...
質問33 When conducting a security audit the first step is to:...
質問34 You are trying to connect to an FTP server on the Internet f...
質問35 A process by which DNS zone data is obtained by an attacker ...
質問36 A malicious user who intercepts and modifies communications ...
質問37 You have a Windows 7 desktop computer, and you create a Stan...
質問38 The purpose of a digital certificate is to verify that a:...
質問39 You need to hide internal IP addresses from the Internet whi...
質問40 Which two characteristics should you recommend for a user's ...
質問41 Setting a minimum password age restricts when users can:...
質問42 Which two are included in an enterprise antivirus program? (...
質問43 E-mail bombing attacks a specific entity by:...
質問44 A digitally signed e-mail message:...
質問45 Cookies impact security by enabling: (Choose two.)...
質問46 You suspect a user's computer is infected by a virus. What s...
質問47 A mail system administrator scans for viruses in incoming em...
質問48 Humongous Insurance is an online healthcare insurance compan...
質問49 The primary purpose of Network Access Protection (NAP) is to...
質問50 A brute force attack:
質問51 Role separation improves server security by:...
質問52 The Graphic Design Institute hires you to help them set up a...
質問53 You have an application that uses IPsec to secure communicat...
質問54 You need to be able to gather information about a running pr...
質問55 Many Internet sites that you visit require a user name and p...
質問56 Which is the minimum requirement to create BitLocker-To-Go m...
質問57 A network sniffer is software or hardware that:...
質問58 Which three elements does HTTPS encrypt? (Choose three.)...
質問59 Where should you lock up the backup tapes for your servers?...
質問60 Windows Firewall is a built-in. host-based, stateless firewa...
質問61 You are trying to establish communications between a client ...
質問62 The Active Directory controls, enforces, and assigns securit...
質問63 You are an intern at Litware, Inc. Your manager asks you to ...
質問64 Password history policies are used to prevent:...
質問65 What is the primary advantage of using Active Directory Inte...
質問66 What are two examples of physical site security? (Choose two...
質問67 You create a web server for your school. When users visit yo...
質問68 Creating MD5 hash for files is an example of ensuring what?...
質問69 The purpose of Microsoft Baseline Security Analyzer is to:...
質問70 What is the standard or basic collection of NTFS permissions...
質問71 The purpose of User Account Control (UAC) is to:...
質問72 You need to install a domain controller in a branch office. ...
質問73 Basic security questions used to reset a password are suscep...
質問74 Phishing is an attempt to: