What is a security program?
A security program alerts you of a failed logon attempt to a secure system. On investigation, you learn the system's normal user accidentally had caps lock turned on. What kind of alert was it?
What are the types of attacks that organizations have seen?
Through your organization you've seen a pattern of attacks of different types. Login attempts, malware, phishing emails, application exploits, and so on. None of the individual techniques are that exotic or hard to stop, but they're seemingly endless and most seem to be the work of the same group of attackers. What kind of threat is this? Choose the best response.
Is the Cisco firewall the internal network?
Your internal network is protected by a Cisco firewall between the WAN and the internal network. While its not having any problems, your supervisor suggests installing a Fortinet firewall between the Cisco firewall and the trusted LAN in order to create a new DMZ. Which security principles does this promote?
Where is the registry located?
The registry keys can be found in the directory of HKLMSoftwareMicrosoftWindowsNTCurrentVersionNetworkListProfiles. This stored in Local Machine because it keeps all copies, not just for specific users.
Do guests need to provide valid identification when registering their wireless devices?
Answer : Guests using the wireless network should provide valid identification when registering their wireless devices