Q1. Which of the following is more secure protocol between Point to Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP)?
A. PPTP and L2TP, both of them define the same security standard.
B. PPTP is more secure than L2TP.
C. PPTP and L2TP , both of them are used to provide the database connection.
D. L2TP is more secure than PPTP.
Answer: D
Q2. Mark works as a Network Administrator fot Blue Well Inc. The company has a Windows-based network. Mark is facing a series of problems with email spam and identifying theft via phishing scams. He wants to implement the various security measures and to provide some education because it is related to the best practices while using email. Which of the following will Mark ask to employees of his company to do when they receive an email from a company they know with a request to click the link to "verify their account information"?
A. Provide the required information
B. Hide the email
C. Use Read-only Domain Controller
D. Delete the email
Answer: D
Q3. You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008
network environment. The network is configured as a Windows Active Directory-based single forest
single domain network. You want to configure Network Access Protection (NAP) on your network.
You want that the clients connecting to the network must contain certain configurations. Which of
the following Windows components ensure that only clients having certain health benchmarks
access the network resources? Each correct answer represents a part of the solution. Choose two.
A. Windows Firewall
B. System Health Agents (SHA)
C. Terminal Service
D. System Health Validators (SHV)
E. TS Gateway
Answer: BD
Q4. Mark works as a Network Administrator fot Blue Well Inc. The company has a Windows-based network. Mark is facing a series of problems with email spam and identifying theft via phishing scams. He wants to implement the various security measures and to provide some education because it is related to the best practices while using email. Which of the following can Mark do after enabling reverse DNS lookups to minimize the amount of spam?
A. Permit User Account Control
B. Add Sender Policy Framework
C. Use Read-only Domain Controller
D. Windows Server Update Services
Answer: B
Q5. Which of the following tools traces all or specific activities of a user on a computer?
A. Task Manager
B. Event Viewer
C. Network Monitor
D. Keylogger
Answer: D
Q6. Which of the following steps will help in system or host hardening? Each correct answer represents a complete solution. Choose two.
A. Installing updated device drivers.
B. Adding users to the administrators group.
C. Installing or applying a patch on the host provided by the operating system manufacturer.
D. Disabling unnecessary services from the host.
Answer: CD
Q7. Which of the following is a broadcast domain created by a switch?
A. VLAN
B. MAN
C. DMZ
D. VPN
Answer: A
Q8. Which of the following are the types of OS fingerprinting techniques? Each correct answer represents a complete solution. Choose two.
A. Passive fingerprinting
B. Active fingerprinting
C. Laser fingerprinting
D. Unidirectional fingerprinting
Answer: AB
Q9. Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network has a Windows Server 2008 member server that works as a Routing and Remote Access Server (RRAS). Mark implements Network Access Protection (NAP) for the network. Mark wants to configure Point-to-Point Protocol (PPP) authentication on the RRAS server. Which of the following authentication methods should Mark use to accomplish this task?
A. EAP
B. CHAP
C. SPAP
D. PAP
Answer: A
Q10. Which of the following is the reason of properly securing an audit log?
A. To ensure that only authorized person can check the log file.
B. To ensure that no one can remove it as there is no back up is provided for this log.
C. To ensure that potential hackers becomes unable to delete the event logs for covering their tracks.
D. To ensure that potential hackers can be tracked easily without changing the network configuration.
Answer: C