Before you run a password cracking program on your company’s computers to check for weak passwords, what should you do?
A. Tell all employees
B. Disable all accounts
C. Get permission from management
D. Change all passwords
C. Get permission from management
You might also like to view...
An object’s ________ count stores the number of ________ that refer to that object.
a) pointer count; handles and pointers b) reference count; pointers c) reference count; handles and pointers d) pointer count; handles
Text effects should be used at most for titles and ________
Fill in the blank(s) with correct word
When configuring a VDI environment, how can network redundancy be accomplished?
A. Multiple network adapters should be used in each host, and should be attached to separate physical switches. B. Multiple network adapters should be used in each host, and should be attached to separate virtual switches. C. Multiple virtual network adapters should be used in each host, and should be attached to separate physical switches. D. Multiple virtual network adapters should be used in each host, and should be attached to separate virtual switches.
A network technician installs a web server on the firewall. Which of the following methods should the technician implement to allow access to outside users without giving access to the inside network?
A. VLAN B. DMZ C. SNMP D. NTP