Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?

A.

Bandwidth

B.

Load

C.

Delay

D.

Frequency

Which of the following is the most secure place to host a server that will be accessed publicly through the Internet?

A.

A DNS Zone

B.

An Intranet

C.

A demilitarized zone (DMZ)

D.

A stub zone

Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?

A.

Electronic Communications Privacy Act of 1986

B.

Economic Espionage Act of 1996

C.

Computer Fraud and Abuse Act

D.

Wiretap Act

Your network utilizes a coax cable for connections between various network segments. Your predecessor made sure none of the coax cables were in an exposed area that could easily be accessed. This caused the use of significant extra cabling. Why do you think this was done?

A.

This was an error you should correct. It wastes the cable and may make maintenance more difficult.

B.

He was concerned about wireless interception of data.

C.

He was concerned about electromagnetic emanation being used to gather data.

D.

He was concerned about vampire taps.

Which of the following cryptographic algorithms uses a single key to encrypt and decrypt data?

A.

Asymmetric

B.

Symmetric

C.

Numeric

D.

Hashing

Based on the case study, to implement more security, which of the following additional technologies should you implement for laptop computers?

(Click the Exhibit button on the toolbar to see the case study.)

Each correct answer represents a complete solution. Choose two.

A.

Encrypted Data Transmissions

B.

Digital certificates

C.

Two-factor authentication

D.

PAP authentication

E.

Encrypting File System (EFS)

Tom works as the project manager for BlueWell Inc. He is working with his project to ensure timely and appropriate generation, retrieval, distribution, collection, storage, and ultimate disposition of project information. What is the process in which Tom is working?

A.

Stakeholder expectation management

B.

Stakeholder analysis

C.

Work performance measurement

D.

Project communication management

Which of the following provides a credential that can be used by all Kerberos-enabled servers and applications?

A.

Remote Authentication Dial In User Service (RADIUS)

B.

Internet service provider (ISP)

C.

Network Access Point (NAP)

D.

Key Distribution Center (KDC)

You work as a SharePoint Administrator for TechWorld Inc. You must protect your SharePoint server farm from viruses that are accidentally uploaded to the SharePoint libraries. You have installed antivirus software that is designed for use with Windows SharePoint server. You have logged on to the Central Administration site.

How can you configure the SharePoint site so that the document libraries are protected?

A.

SharePoint does not support antivirus solutions.

B.

Restrict users to read only on document libraries.

C.

Choose the Scan documents on upload option in the antivirus settings.

D.

Require all documents to be scanned on the local PC before uploading to the SharePoint sit e.