GradePack

    • Home
    • Blog
Skip to content
bg
bg
bg
bg

GradePack

After configuring a password policy to require users to crea…

After configuring a password policy to require users to create strong passwords, you start to notice sticky notes stuck to monitors throughout the organization. The sticky notes often have strings of characters written on them that appear to be passwords.   What can you do to prevent the security risk that this practice presents?

Read Details

You are the network administrator for your company. Your net…

You are the network administrator for your company. Your network consists of two Active Directory domains, research.westsim.local and sales.westsim.local.   Your company has two sites, Dallas and Houston. Each site has two domain controllers, one domain controller for each domain.   Users in Houston who are members of the sales.westsim.local domain report slow performance when logging in and accessing files in Dallas. Users in Dallas do not report any problems logging in and accessing local resources. You want all users in Houston to experience adequate login and resource access response time.   What should you do?

Read Details

A group of small local businesses have joined together to sh…

A group of small local businesses have joined together to share access to a cloud-based payment system. Which type of cloud is MOST likely being implemented?

Read Details

Which of the following types of proxies would you use to rem…

Which of the following types of proxies would you use to remain anonymous when surfing the internet?

Read Details

It is important to follow correct procedures when running el…

It is important to follow correct procedures when running electrical cables next to data cables in order to protect against which environmental concern?

Read Details

A user copies files from her desktop computer to a USB flash…

A user copies files from her desktop computer to a USB flash device and puts the device into her pocket. Which of the following security risks is most pressing?

Read Details

By definition, what is the process of reducing security expo…

By definition, what is the process of reducing security exposure and tightening security controls?

Read Details

You have performed an audit and found an active account for…

You have performed an audit and found an active account for an employee with the username joer. This user no longer works for the company.   Which command can you use to disable this account?

Read Details

Which type of update should be prioritized even outside of a…

Which type of update should be prioritized even outside of a normal patching window?

Read Details

Which of the following sends unsolicited business cards and…

Which of the following sends unsolicited business cards and messages to a Bluetooth device?

Read Details

Posts pagination

Newer posts 1 … 75,149 75,150 75,151 75,152 75,153 … 81,519 Older posts

GradePack

  • Privacy Policy
  • Terms of Service
Top