Account lockout policies are used to prevent which type of security attack?
Answer : A
What is the standard or basic collection of NTFS permissions?
Answer : A
Reference:
http://technet.microsoft.com/en-us/library/bb727008.aspx
Which is the minimum requirement to create BitLocker-To-Go media on a client computer?
Answer : A
Which enables you to change the permissions on a folder?
Answer : D
A group of users has access to Folder A and all of its contents. You need to prevent some of the users from accessing a subfolder inside Folder A.
What should you do first?
Answer : A
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:
Answer :
Explanation:
Biometric devices, such as finger scanners consist of a reader or scanning device, Software that converts the scanned information into digital form and compares match points, and a database that stores the biometric data for comparison. To prevent identity theft, biometric data is usually encrypted when it is gathered.
What are three examples of two-factor authentication? (Choose three.)
Answer : ABE
Explanation:
At minimum two-factor authentication requires two out of three regulatory-approved authentication variables such as:
-> Something you know (like the PIN on your bank card or email password).
-> Something you have (the physical bank card or a authenticator token).
-> Something you are (biometrics like your finger print or iris pattern).
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:
Answer :
You need to limit the programs that can run on client computers to a specific list.
Which technology should you implement?
Answer : A
The purpose of User Account Control (UAC) is to:
Answer : B
Explanation:
User Account Control (UAC) is a technology and security infrastructure introduced with Microsoft's Windows machines. It aims to improve the security of Microsoft
Windows by limiting application software to standard user privileges until an administrator authorizes an increase or elevation. In this way, only applications trusted by the user may receive administrative privileges, and malware should be kept from compromising the operating system.
What does implementing Windows Server Update Services (WSUS) allow a company to manage?
Answer : D
The purpose of Microsoft Baseline Security Analyzer is to:
Answer : A
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:
Answer :
The Graphic Design Institute hires you to help them set up a server for their 20-person team.
As a general practice of hardening the server, you start by performing which two tasks? (Choose two.)
Answer : AB
What are two attributes that an email message may contain that should cause a user to question whether the message is a phishing attempt? (Choose two.)
Answer : BC
Reference:
http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx
Have any questions or issues ? Please dont hesitate to contact us