1.
Which of the following statements is TRUE regarding the command used for trying to communicate with the network adapter's loopback device?
2.
A Certkiller .com technician notices that there is CAT5e cabling lying on the floor in different offices parts of the network. What should the technician do?
3.
Which of the following is the BEST method for securing a web browser?
4.
Which of the following preventive maintenance tasks should be performed regularly on a Certkiller .com computer that has Internet access?
5.
Which additional security measure does Network Address Translation (NAT) provide for computers behind a gateway router?
6.
Which of the following is NOT a valid access control mechanism?
7.
Which of the following uses permissions to control access to network resources?
8.
Several Certkiller .com users want to make system changes on their Windows XP Professional computers. What would be the BEST action that the technician should take?
9.
All Certkiller .com's computers are running Windows XP Professional SP2 and are connected to Certkiller .com's Active Directory. All users have to be able to make some system changes on their individual workstation. As a technician, which of the following actions should you use to make this possible?
10.
Where would the Certkiller .com technician find a record of the users that have successfully logged on to a computer?