To implement WPA2 Enterprise, you would need a/an:
Correct Answer:A
A group of users has access to Folder A and all of its contents. You need to prevent some of the users from accessing a subfolder inside Folder A.
What should you do first?
Correct Answer:A
Your password is 1Vu*cI!8sT.
Which attack method is your password vulnerable to?
Correct Answer:A
Which two characteristics should you recommend for a user's domain password? (Choose two.)
Correct Answer:AC
Reference: http://www.usewisdom.com/computer/passwords.html
What are two attributes that an email message may contain that should cause a user to question whether the message is a phishing attempt? (Choose two.)
Correct Answer:BC
Reference: http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx