[Free] 2017(Oct) EnsurePass Testinsides Microsoft 98-367 Dumps with VCE and PDF 61-70

EnsurePass
2017 Oct Microsoft Official New Released 98-367
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/98-367.html

Security fundamentals

Question No: 61

The purpose of Microsoft Baseline Security Analyzer is to:

  1. List system vulnerabilities.

  2. Apply all current patches to a server.

  3. Set permissions to a default level.

  4. Correct a company#39;s security state.

Answer: A

Question No: 62

Windows Firewall is a built-in. host-based, stateless firewall.

Select the correct answer if the underlined text does not make the statement correct. Select

quot;No change is neededquot; if the underlined text makes the statement correct.

  1. Stateful

  2. Network layer

  3. Packet filter

  4. No change is needed

Answer: A

Question No: 63

You are volunteering at an organization that gets a brand new web server. To make the server more secure, you should add a second administrator account.

Select the correct answer if the underlined text does not make the statement correct. Select quot;No change is neededquot; if the underlined text makes the statement correct.

  1. Disable unused services

  2. Enable LM authentication

  3. Enable NTLM authentication

  4. No change is needed.

Answer: A

Question No: 64

Which attack listens to network traffic of a computer resource?

  1. Resource gathering

  2. Denial of service

  3. ARP poisoning

  4. Eavesdropping

  5. Logic bomb

Answer: D Explanation: Eavesdropping

In general, the majority of network communications occur in an unsecured or quot;cleartextquot;

format, which allows an attacker who has gained access to data paths in your network to quot;listen inquot; or interpret (read) the traffic. When an attacker is eavesdropping on your communications, it is referred to as sniffing or snooping. The ability of an eavesdropper to monitor the network is generally the biggest security problem that administrators face in an enterprise. Without strong encryption services that are based on cryptography, your data can be read by others as it traverses the network.

Question No: 65

Your company requires that users type a series of characters to access the wireless network.

The series of characters must meet the following requirements:

->Contains more than 15 characters

->Contains at least one letter

->Contains at least one number

->Contains at least one symbol

Which security technology meets these requirements?

  1. WEP

  2. WPA2 PSK

  3. WPA2 Enterprise

  4. MAC filtering

Answer: B

Explanation: Pre-shared key mode (PSK, also known as Personal mode) is designed for home and small office networks that don#39;t require the complexity of an 802.1X authentication server.[9] Each wireless network device encrypts the network traffic using a 256 bit key. This key may be entered either as a string of 64 hexadecimal digits, or as a passphrase of 8 to 63 printable ASCII characters

Question No: 66

You are an intern at Wide World Importers and help manage 1000 workstations. All the workstations are members of an Active Domain.

You need to push out an internal certificate to Internet Explorer on all workstations. What is the quickest method to do this?

  1. Local policy

  2. Logon script

  3. Windows Update

  4. Group policy

Answer: A

Question No: 67

The Graphic Design Institute hires you to help them set up a server for their 20-person team.

As a general practice of hardening the server, you start by performing which two tasks? (Choose two.)

  1. Disable the guest account.

  2. Rename the admin account.

  3. Remove the account lockout policy.

  4. Format partitions with FAT32.

Answer: A,B

Question No: 68

A user who receives a large number of emails selling prescription medicine is probably receiving pharming mail.

Select the correct answer if the underlined text does not make the statement correct. Select quot;No change is neededquot; if the underlined text makes the statement correct.

  1. Malware

  2. Spoofed mail

  3. Spam

  4. No change is needed.

Answer: C

Question No: 69

You create a web server for your school. When users visit your site, they get a certificate error that says your site is not trusted.

What should you do to fix this problem?

  1. Install a certificate from a trusted Certificate Authority (CA).

  2. Use a digital signature.

  3. Generate a certificate request.

  4. Enable Public Keys on your website.

Answer: A

Question No: 70

Keeping a server updated:

  1. Maximizes network efficiency

  2. Fixes security holes

  3. Speeds up folder access

  4. Synchronizes the server

Answer: B

100% Free Download!
Download Free Demo:98-367 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 98-367 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

Your email address will not be published. Required fields are marked *