00:00

QUESTION 31

- (Topic 1)
You are concerned about rootkits on your network communicating with attackers outside your network. Without using an IDS how can you detect this sort of activity?

Correct Answer: A

QUESTION 32

- (Topic 1)
Which of the following types of authentications supported by OSPF? Each correct answer represents a complete solution. Choose three.

Correct Answer: ABC

QUESTION 33

- (Topic 1)
How should you configure the Regional Centers' e-mail, so that it is secure and encrypted? (Click the Exhibit button on the toolbar to see the case study.)

Correct Answer: C

QUESTION 34

- (Topic 1)
You work as a SharePoint Administrator for TechWorld Inc. You must protect your SharePoint server farm from viruses that are accidentally uploaded to the SharePoint libraries. You have installed antivirus software that is designed for use with Windows SharePoint server. You have logged on to the Central Administration site.
How can you configure the SharePoint site so that the document libraries are protected?

Correct Answer: C

QUESTION 35

- (Topic 2)
Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?

Correct Answer: B