in

SMSUG.ca

...your virtual communITy
All Tags » 70-298 (RSS)

Browse by Tags

  • 70-298 Section 1.3

    What are the four consideration for identifying technology limitations?
    Posted to Garth Jones (Weblog) by Garth on 06-22-2008
  • 70-298 Section 1.2 Bonus Answer

    What type of perimeter network is this called? Routed network External network Classic perimeter network Three segmented network Egress points network Answer: Three segmented network
    Posted to Garth Jones (Weblog) by Garth on 06-21-2008
  • What is the difference between B&D?

    Do I need more coffee as I don't see a difference between B & D, What do you think?
    Posted to Garth Jones (Weblog) by Garth on 06-20-2008
  • 70-298 "Pardon" (course 2830)

    I found out for another MCT that MCT have access to e-learning courses from MS E-learning. I like CBTs, I use the NetG CBTs to help me with my MCSE on NT4. So I thought that I would try the CBT from MS learning for 70-298 (course 2830) since I am finding it hard to read the book. Well I found a bug within...
    Posted to Garth Jones (Weblog) by Garth on 06-20-2008
  • 70-298 Section 1.2 Bonus

    What type of perimeter network is this called? Routed network External network Classic perimeter network Three segmented network Egress points network
    Posted to Garth Jones (Weblog) by Garth on 06-20-2008
  • 70-298 Section 1.2 Answer

    Name 6 of the 12, Principles of Information Security Design? Answer: Separation of Duties Least Privilege Reduce the attack surface Defence in depth Diversity of mechanism Use of Fail-safe defaults Economy of mechanism Use of open design Complete mediation Psychological Acceptability Trust but Audit...
    Posted to Garth Jones (Weblog) by Garth on 06-19-2008
  • 70-298 Section 1.2

    Name 6 of the 12, Principles of Information Security Design?
    Posted to Garth Jones (Weblog) by Garth on 06-18-2008
  • 70-298 Section 1.1 Answer

    Should the IT Security Officer report to the Chief Information Officer (CIO) or Chief Technology Officer (CTO)? True or False False, you should never have the team that audits IT report that the same manager. Generally you will find that IT security officer will report Company Serurity Officer, who interns...
    Posted to Garth Jones (Weblog) by Garth on 06-17-2008
  • 70-298 Section 1.1

    Should the IT Security Officer report to the Chief Information Officer (CIO) or Chief Technology Officer (CTO)? True or False
    Posted to Garth Jones (Weblog) by Garth on 06-16-2008
Page 11 of 11 (109 items) « First ... < Previous 7 8 9 10 11
©2010 SMSUG.ca Privacy Statement
Powered by Community Server (Non-Commercial Edition), by Telligent Systems