HOTSPOT
John works as an office assistance in an office. The office uses Windows Vista operating system. He wants to disable a program from running on a computer. He opens the Windows Defender window and clicks on the Tools link. He clicks on a link to view the list of programs running on the computer, selects a program and then clicks on the Disable button to disable it. Mark the option that John had chosen to view the list of programs running on the computer.
Hot Area:
HOTSPOT
You work as a Network Administrator for uCertify Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. All clients on the network run Windows 2000 Professional. The
company policy prevents you from installing the Firewall Client software or configuring the Web Proxy service on any client computer. You configure access policy rules to allow all the users to use the HTTP protocol for accessing all Internet
sites. However, users on the network report that they are unable to do so.
Mark the option that is configured incorrectly.
Hot Area:
HOTSPOT
Sam works as a network administrator in Bluewell Inc. The company uses Windows Vista operating system. He wants to restore a program that is blocked by Windows Defender. He opens the Windows Defender window and clicks on the Tools link. He clicks on a link to view the list of programs blocked by Windows Defender, selects a program and then clicks on the Restore button to restore it. Mark the option that Sam had chosen to view the list of programs blocked by Windows Defender.
Hot Area:
HOTSPOT
The network infrastructure of a company consists of a perimeter network. For security purposes, the network zones have been created and divided into a firewall-based Border network and a DMZ. The enterprise internal network is attacked
by a latest Internet worm.
Which of the following devices in the enterprise network should be upgraded or reconfigured to counter this type of attack?
Hot Area:
HOTSPOT
George works as an Office Assistance in TechSoft Inc. All client computers in the company run Windows Vista operating system. He has turned on the Windows Firewall for security purposes. He prepares a document and wants to share it with other users of the company. When he tries to share the document, he gets a message that firewall has blocked the sharing of the files on his computer. He wants to ensure that that the firewall does not block sharing of the document. He opens Windows Firewall dialog box.
What actions will he perform in the dialog box to accomplish the task?
Hot Area:
HOTSPOT
You work as a Network Administrator for McRobert Inc. The company has a Windows Active Directory-based single domain single forest network. The network includes fifty client computers running different Windows client operating systems.
A member server named MRIFS is configured as a file server on the network. You are required to implement the following:
The data communication must be encrypted whenever possible.
Each client computer must be able to access the server.
Configure the required options in the dialog box given below in order to accomplish the task.
Hot Area:
HOTSPOT
You work as a Network Administrator of a Windows 2000 Active Directory-based single domain network. You have configured your Windows XP Professional computer at home to have a static IP address assigned by your Internet service
provider (ISP). It is always connected to the Internet through a modem. You have enabled the Internet Connection Firewall for the Internet connection. You use the PING command to check the connectivity of your home computer from office,
but you receive the following error message:
Request timed out.
On examining the log file of the Internet Connection Firewall on your home computer, you find DROP ICMP messages. You want to ping your home computer without compromising on security.
Select the option in the Internet Connection Firewall Advanced Settings dialog box, which will be required to be checked to accomplish the task.
Hot Area:
HOTSPOT
In the image of the Screened Host Firewall Architecture given below, select the element that is commonly known as the access router.
Hot Area:
SIMULATION
Fill in the blank with the command to complete the statement below. Do not enter the full path of the command.
The ________ command supports system logging and kernel message trapping.
SIMULATION
Fill in the blank with the appropriate term.
When two routers are used in a firewall configuration, the internal router is known as a ______ router.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GSNA exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.