What are two reasons to implement VLANs? (Choose two.) A. Manage traffic flow between the Internet and the network B. Create the most secure path between two hosts C. Enable grouping of hosts regardless of physical location D. Separate hosts…

Email spoofing: A. obscures the true email sender B. copies email messages sent from a specific user C. modifies email routing logs D. forwards email messages to all contacts

You have a Windows 2012 R2 Server. Security logging is enabled. You use this log for several audits of the server. You need to make sure the log is not overwritten when it reaches its maximum log size. What should…

You manage 50 Windows workstations in a computer lab. All workstations belong to the lab Active Directory domain. You need to implement several audit policies on each workstation in the shortest time possible. What should you do? A. Enable logging…