1What is a good practice to prevent an unauthorized user from guessing a passwordand accessing an account?disabling account lockout status within the networkenabling a user account only after issuing a password to the user over thephone***locking out the account after a small, finite number of unsuccessfulattemptssetting the user account password to be left blank for the first login2Which two file system security features are applicable to the NTFS file system?(Choose two.)supports file and folder level encryptionsupported by all versions of Windows from, and including, Windows 95limited to 4 GB files size and a volume limit of 32 GBnumber of files in a volume limited to 4.17 million***includes journaling3What must be done to ensure that the anti-virus software on a computer is able todetect and eradicate the most recent viruses?***Download the latest signature files on a regular basis.Schedule a scan once a week.Schedule anti-virus updates using Windows Task Manager.Follow the firewall configuration guidelines on the anti-virus manufacturerwebsite.4Which statement accurately describes the WEP standard?***WEP is a first generation security standard for wireless communication.WEP is implemented using 16-bit encryption.WEP provides better encryption and authentication than WPA provides.WEP was created as a temporary solution until the implementation of 802.11i.5How can web tools, such as Java or ActiveX, be used for a malicious attack?by altering the interactivity level of a web pageby creating popup windowsby causing the web browser to crash, leaving the system vulnerable***by installing unwanted programs on a computer6The IT manager of a bank is disposing of some computers, but the hard drives havesome highly confidential data on them. What is the recommended way of dealing withthe drive to ensure that the data is irrecoverable?Delete all files and folders.Reformat the drive.Use a utility that overwrites all the data on the drive.***Break the drive platters with a hammer.7Which is the best procedure to secure a laptop left at the office while the useris away for an extended period of time?Secure by a security cable wrapped around the leg of the user's desk.Put the laptop in a desk drawer in the locked office of the user.***Place the laptop in a locked security cage designed to store computerequipment.