Cisco Related Exams
100-160 Exam
Your supervisor suspects that someone is attempting to gain access to a Windows computer by guessing user account IDs and passwords. The supervisor asks you to use the Windows Event Viewer security logs to verify the attempts.
Which two audit policy events provide information to determine whether someone is using invalid credentials to attempt to log in to the computer?(Choose 2.)
Note: You will receive partial credit for each correct selection.
A restaurant installs a second wireless router that only employees can use.
Which statement describes how to securely configure the new router?
Which network security technology passively monitors network traffic and compares the captured packet stream with known malicious signatures?