98-367 Exam Question 21
Which of the following are the types of OS fingerprinting techniques? Each correct answer represents a complete solution. Choose two.
98-367 Exam Question 22
You need to prevent unauthorized users from reading a specific file on a portable computer if the portable computer is stolen.
What should you implement?
What should you implement?
98-367 Exam Question 23
Which of the following practices should be followed to keep passwords secure? Each correct answer represents a complete solution. Choose three.
98-367 Exam Question 24
What is the standard or basic collection of NTFS permissions?
98-367 Exam Question 25
You need to limit the programs that can run on client computers to a specific list.
Which technology should you implement?
Which technology should you implement?