Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Andrew works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains five Windows 2008 member servers and 120 Windows XP Professional client computers. Andrew is concerned about the member servers that are not meeting the security requirements as mentioned in the security policy of the company. Andrew wants to compare the current security settings of the member servers with the security template that is configured according to the security policy of the company. Which of the following tools will Andrew use to accomplish this?

A.

Security Configuration and Analysis Tool

B.

Active Directory Migration Tool (ADMT)

C.

Task Manager

D.

Group Policy Management Console (GPMC)

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. On the We-are-secure login page, he enters ='or''=' as a username and successfully logs in to the user page of the Web site. The We-are-secure login page is vu lnerable to a __________.

A.

Social engineering

B.

Smurf DoS

C.

Brute force

D.

Ping flood attack

How should you configure the Regional Centers' e-mail, so that it is secure and encrypted?

(Click the Exhibit button on the toolbar to see the case study.)

A.

Use EFS.

B.

Use IPSec.

C.

Use S/MIME.

D.

Use TLS.

How long are cookies in effect if no expiration date is set?

A.

Fifteen days

B.

Until the session ends.

C.

Forever

D.

One year

Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?

A.

The Configuration Manager

B.

The Supplier Manager

C.

The IT Service Continuity Manager

D.

The Service Catalogue Manager

The Project Risk Management knowledge area focuses on which of the following processes?

Each correct answer represents a complete solution. Choose all that apply.

A.

Risk Management Planning

B.

Quantitative Risk Analysis

C.

Potential Risk Monitoring

D.

Risk Monitoring and Control

Availability Management allows organizations to sustain the IT service availability to support the business at a justifiable cost. Which of the following elements of Availability Management is used to perform at an agreed level over a period of time?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Maintainability

B.

Resilience

C.

Error control

D.

Recoverability

E.

Reliability

F.

Security

G.

Serviceability

Every network device contains a unique built in Media Access Control (MAC) address, which is used to identify the authentic device to limit the network access. Which of the following addresses is a valid MAC address?

A.

F936.28A1.5BCD.DEFA

B.

A3-07-B9-E3-BC-F9

C.

1011-0011-1010-1110-1100-0001

D.

132.298.1.23

You work as a security manager in Mariotiss Inc. Your enterprise has been facing network and software security threats since a few months. You want to renew your current security policies and management to enhance the safety of your information systems. Which of the following is the best practice to initiate the renewal process from the lowest level with the least managerial effort?

A.

Start the Incident handling process.

B.

Change the entire security policy.

C.

Perform an IT audit.

D.

Switch to a new network infrastructure.

Which of the following are core TCP/IP protocols that can be implemented with Windows NT to connect computers and internetworks?

Each correct answer represents a complete solution. Choose all that apply.

A.

Address Resolution Protocol (ARP)

B.

Network Link Protocol (NWLink)

C.

User Datagram Protocol (UDP)

D.

Internet Control Message Protocol (ICMP)