Rick, the Network Administrator of the Fimbry Hardware Inc., wants to design the initial test model for Internet Access. He wants to fulfill the following goals:
No external traffic should be allowed into the network.
Administrators should be able to restrict the websites which can be accessed by the internal users.
Which of the following technologies should he use to accomplish the above goals? (Click the Exhibit button on the toolbar to see the case study.)
Answer : D
Which of the following backup sites takes the longest recovery time?
Answer : A
You are the project manager for the TTR project. You are in the process of gathering information for risk identification. You ask experts to participate in the process through their emails for maintaining anonymity. You collect the responses, summarize them, and are then re-circulated to the experts for further comment. Which of the following techniques are you using for risk identification?
Answer : B
You have been asked to create a project charter for a new database project. Management has stressed that in order to effectively create a project charter, you'll first need to understand all of the following except for which one?
Answer : D
You work as a Network Administrator for McNeil Inc. The company has a Windows Active
Directorybased single domain single forest network. The functional level of the forest is
Windows Server 2003. The company's management has decided to provide laptops to its sales team members. These laptops are equipped with smart card readers. The laptops will be configured as wireless network clients. You are required to accomplish the following tasks:
The wireless network communication should be secured.
The laptop users should be able to use smart cards for getting authenticated.
In order to accomplish the tasks, you take the following steps:
Configure 802.1x and WEP for the wireless connections.
Configure the PEAP-MS-CHAP v2 protocol for authentication
What will happen after you have taken these steps?
Answer : B