98-367 Exam Question 21

Which of the following are the types of OS fingerprinting techniques? Each correct answer represents a complete solution. Choose two.
  • 98-367 Exam Question 22

    You need to prevent unauthorized users from reading a specific file on a portable computer if the portable computer is stolen.
    What should you implement?
  • 98-367 Exam Question 23

    Which of the following practices should be followed to keep passwords secure? Each correct answer represents a complete solution. Choose three.
  • 98-367 Exam Question 24

    What is the standard or basic collection of NTFS permissions?
  • 98-367 Exam Question 25

    You need to limit the programs that can run on client computers to a specific list.
    Which technology should you implement?