98-367 Exam Question 136
Which attack listens to network traffic of a computer resource?
98-367 Exam Question 137
John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation? Each correct answer represents a complete solution. Choose all that apply.
98-367 Exam Question 138
Which of the following is a secret numeric password shared between a usera system for authenticating the user to the system?
98-367 Exam Question 139
Which two characteristics should you recommend for a user's domain password? (Choose two.)
98-367 Exam Question 140
Which of the following is used to describe the policy of maximum password age?