I.T. CHAPTERS 15 AND 16
A network technician has received several reports regarding missing and corruptedinformation on a company file server. Which course of action can the technician use toinvestigate any unauthorized network access?Audit all user activity by using telnet to access each computer during the day.Enable event logging on each user computer to check for unauthorized networkaccess.Enable event logging on all network devices to audit any suspicious user activity.
Audit the event logs on the server to check for unauthorized network access.
Which two advantages are attributed to a hardware firewall when compared to asoftware firewall? (Choose two.)It costs less because it is more efficient.
It does not impact the processing performance of the equipment it protects.
It always protects both the computer it is installed on as well as the rest of thenetwork.
It is designed to protect more than one computer.
It is a free Windows operating system component.A company wants to configure a firewall to monitor all channels of communication andallow only traffic that is part of a known connection. Which firewall configuration shouldbe deployed?packet filteringproxy
stateful packet inspection
stateless packet inspectionA technician has been asked to format the drives of several Windows XP computerswith a file system that can use file-level permissions to secure confidential information.Which file system should be used by the technician?