Andrew works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains five Windows 2008 member servers and 120 Windows XP Professional client computers. Andrew is concerned about the member servers that are not meeting the security requirements as mentioned in the security policy of the company. Andrew wants to compare the current security settings of the member servers with the security template that is configured according to the security policy of the company. Which of the following tools will Andrew use to accomplish this?
Sam is creating an e-commerce site. He wants a simple security solution that does not require each customer to have an individual key. Which of the following encryption methods will he use?
Which of the following are the examples of administrative controls?Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements about Secure Shell (SSH) are true?Each correct answer represents a complete solution. Choose three.
Which of the following is an organization that defines standards for anti-virus software?
Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following?1. To account for all IT assets2. To provide precise information support to other ITIL disciplines3. To provide a solid base only for Incident and Problem Management4. To verify configuration records and correct any exceptions