EnsurepassQUESTION 61 What is a service set identifier (SSID)? A. A wireless encryption standard B. The wireless LAN transmission type C. The broadcast name
EnsurepassQUESTION 71 You need to limit the programs that can run on client computers to a specific list. Which technology should you implement? A.
EnsurepassQUESTION 51 Phishing is an attempt to: A. Obtain information by posing as a trustworthy entity. B. Limit access to e-mail systems by authorized
EnsurepassQUESTION 31 Which enables you to change the permissions on a folder? A. Take ownership B. Extended attributes C. Auditing D. Modify Correct
EnsurepassQUESTION 21 You need to install a domain controller in a branch office. You also need to secure the information on the domain controller. You
EnsurepassQUESTION 11 Dumpster diving refers to a physical threat that a hacker might use to look for information about a computer network. Select the
EnsurepassQUESTION 41 What is a common method for password collection? A. Email attachments B. Back door intrusions C. SQL Injection D. Network sniffers
EnsurepassQUESTION 1 To implement WPA2 Enterprise, you would need a/an: A. RADIUS server B. SSL server C. WEP server D. VPN server Correct