Question 1
What are two reasons to implement VLANs? (Choose two.)
Question 2
A Virtual Private Network (VPN) is a/an:
Question 3
A group of users has access to Folder A and all of its contents. You need to prevent some of the users from accessing a subfolder inside Folder A.
What should you do first?
What should you do first?
Question 4
On which of the following is the level of security set for the local intranet zone applied?
Question 5
Your password is 1Vu*cI!8sT.
Which attack method is your password vulnerable to?
Which attack method is your password vulnerable to?
