In addition to Authentication Header (AH), IPsec is comprised of what other service?
You are attempting to delete the temp group but are unable t…
You are attempting to delete the temp group but are unable to. Which of the following is the MOST likely cause?
What does a remote access server use for authorization?
What does a remote access server use for authorization?
Above all else, what must be protected to maintain the secur…
Above all else, what must be protected to maintain the security and benefit of an asymmetric cryptographic solution, especially if it is widely used for digital certificates?
Although he painted the Sistine Chapel, ___ never felt he ha…
Although he painted the Sistine Chapel, ___ never felt he had any actual talent for painting, only sculpture.
Which of the following occurs prior to orduring stage 1 of l…
Which of the following occurs prior to orduring stage 1 of labor?
You are the owner of the D:\Reports folder. Judith needs t…
You are the owner of the D:\Reports folder. Judith needs to be able to see the files and subfolders in the D:\Reports folder. Dalton needs to be able to do these same things and also delete folders. You need to assign the necessary NTFS permissions to the D:\Reports folder. What should you do?
You are the domain administrator for a single domain forest….
You are the domain administrator for a single domain forest. You have 10 file servers that are member servers running Windows Server. Your company has designed its top-level OU structure based on the 15 divisions for your company. Each division has a global security group containing the user accounts for division managers. You have folders on your file servers that all division managers should have permission to access. For some resources, all division managers will need full control. For others, they will only need read or change permissions. You need a group strategy that will facilitate the assignment of permissions but minimize administrative effort. What should you do?
You are the administrator of a network with a single Active…
You are the administrator of a network with a single Active Directory domain. Your domain contains three domain controllers and five member servers. Your security policy states that all accounts should be locked out after three unsuccessful logon attempts and that accounts must be reset only by an administrator. A GPO enforces these settings. You receive a call Monday morning from the help desk. There are seven users who are unable to log in to the domain. Upon further investigation, you notice all seven accounts have been locked out. You need to unlock the user accounts with the least amount of administrative effort while complying with your security policy. What should you do next?
After configuring a password policy to require users to crea…
After configuring a password policy to require users to create strong passwords, you start to notice sticky notes stuck to monitors throughout the organization. The sticky notes often have strings of characters written on them that appear to be passwords. What can you do to prevent the security risk that this practice presents?