Mark works as a Network Administrator fot Blue Well Inc. The company has a Windows-based
network. Mark is facing a series of problems with email spam and identifying theft via phishing
scams. He wants to implement the various security measures and to provide some education
because it is related to the best practices while using email. Which of the following will Mark ask to
employees of his company to do when they receive an email from a company they know with a
request to click the link to “verify their account information”?
A.
Provide the required information
B.
Hide the email
C.
Use Read-only Domain Controller
D.
Delete the email
Explanation:
In the above scenario, Mark will ask his employees to delete the email whenever he receives an
email from a company that they know with to click the link to “verify their account information”,
because companies do not ask for account information via email now a days.
read-only partition of the Active Directory database. RODC was developed by Microsoft typically to
be deployed in a branch office environment. RODC is a good option to enhance security by placing it
in a location where physical security is poor. RODC can also be placed at locations having relatively
few users and a poor network bandwidth to the main site. As only the read-only partition of the
Active Directory database is hosted by RODC, a little local IT knowledge is required to maintain it.
The right answer is D.