[Free] 2017(Sep) EnsurePass Examcollection Microsoft 98-367 Dumps with VCE and PDF 71-80

EnsurePass
2017 Sep Microsoft Official New Released 98-367
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/98-367.html

Security fundamentals

Question No: 71

You sign up for an online bank account. Every 6 months, the bank requires you to change your password. You have changed your password 5 times in the past. Instead of coming up with a new password, you decide to use one of your past passwords, but the bank#39;s

password history prevents you on doing so.

Select the correct answer if the underlined text does not make the statement correct Select quot;No change is neededquot; if the underlined text makes the statement correct.

  1. Minimum password age

  2. Maximum password duration

  3. Password complexity

  4. No change is needed.

Answer: D

Question No: 72 HOTSPOT

Alice sends her password to the game server in plaintext. Chuck is able to observe her password as shown in the following image:

Ensurepass 2017 PDF and VCE

Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.

Ensurepass 2017 PDF and VCE

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Explanation: First answer – Eavesdropping Second Answer – never send a plaintext password

Question No: 73

Account lockout policies are used to prevent which type of security attack?

  1. Brute force attacks

  2. Users sharing passwords

  3. Social engineering

  4. Passwords being reused immediately

Answer: A

Question No: 74

Which type of firewall allows for inspection of all characteristics of a packet?

  1. NAT

  2. Stateful

  3. Stateless

  4. Windows Defender

Answer: B

Reference: http://en.wikipedia.org/wiki/Stateful_firewall

Question No: 75

Windows Server Update Services (WSUS) is a tool that:

  1. Updates data stored in Windows servers

  2. Manages the services that run on a server

  3. Updates licensing for Windows servers

  4. Manages updates for Microsoft software

Answer: D Explanation:

Windows Server Update Services (WSUS) enables information technology administrators to deploy the latest Microsoft product updates to computers that are running the Windows operating system. By using WSUS, administrators can fully manage the distribution of updates that are released through Microsoft Update to computers in their network.

Reference: http://technet.microsoft.com/en-us/windowsserver/bb332157.aspx

Question No: 76 HOTSPOT

Your supervisor asks you to review file permission settings on the application.bat file. You need to report which file system the file is on and the type of permission the file has. You review the application Properties dialog box shown in the following image:

Ensurepass 2017 PDF and VCE

Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.

Ensurepass 2017 PDF and VCE

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Ensurepass 2017 PDF and VCE

Explanation:

C:\Users\Kamran\Desktop\image.jpg

Question No: 77

Which of the following describes a VLAN?

  1. It connects multiple networks and routes data packets.

  2. It is a logical broadcast domain across physical subnets.

  3. It is a subnetwork that reveals a company#39;s externally facing resources to the public network.

  4. It allows different network protocols to communicate between different network segments.

Answer: B Explanation:

VLAN (Virtual Local Network) is a logically separate IP subnetwork which allow multiple IP networks and subnets to exist on the same-switched network.

VLAN is a logical broadcast domain that can span multiple physical LAN segments. It is a modern way administrators configure switches into virtual local-area networks (VLANs) to improve network performance by separating large Layer 2 broadcast domains into smaller ones.

Question No: 78

You suspect a user#39;s computer is infected by a virus. What should you do first?

  1. Restart the computer in safe mode

  2. Replace the computer#39;s hard disk drive

  3. Disconnect the computer from the network

  4. Install antivirus software on the computer

Answer: D

Question No: 79

What are two attributes that an email message may contain that should cause a user to question whether the message is a phishing attempt? (Choose two.)

  1. An image contained in the message

  2. Spelling and grammar errors

  3. Threats of losing service

  4. Use of bold and italics

Answer: B,C

Reference: http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx

Question No: 80

Humongous Insurance needs to set up a domain controller in a branch office. Unfortunately, the server cannot be sufficiently secured from access by employees in that office, so the company is installing a Primary Domain Controller.

Select the correct answer if the underlined text does not make the statement correct. Select quot;No change is neededquot; if the underlined text makes the statement correct.

  1. Read-Only Domain Controller

  2. Backup Domain Controller

  3. Active Directory Server

  4. No change is needed.

Answer: A

100% Free Download!
Download Free Demo:98-367 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 98-367 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

[Free] 2017(Sep) EnsurePass Examcollection Microsoft 98-367 Dumps with VCE and PDF 61-70

EnsurePass
2017 Sep Microsoft Official New Released 98-367
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/98-367.html

Security fundamentals

Question No: 61

The purpose of Microsoft Baseline Security Analyzer is to:

  1. List system vulnerabilities.

  2. Apply all current patches to a server.

  3. Set permissions to a default level.

  4. Correct a company#39;s security state.

Answer: A

Question No: 62

Windows Firewall is a built-in. host-based, stateless firewall.

Select the correct answer if the underlined text does not make the statement correct. Select

quot;No change is neededquot; if the underlined text makes the statement correct.

  1. Stateful

  2. Network layer

  3. Packet filter

  4. No change is needed

Answer: A

Question No: 63

You are volunteering at an organization that gets a brand new web server. To make the server more secure, you should add a second administrator account.

Select the correct answer if the underlined text does not make the statement correct. Select quot;No change is neededquot; if the underlined text makes the statement correct.

  1. Disable unused services

  2. Enable LM authentication

  3. Enable NTLM authentication

  4. No change is needed.

Answer: A

Question No: 64

Which attack listens to network traffic of a computer resource?

  1. Resource gathering

  2. Denial of service

  3. ARP poisoning

  4. Eavesdropping

  5. Logic bomb

Answer: D Explanation: Eavesdropping

In general, the majority of network communications occur in an unsecured or quot;cleartextquot;

format, which allows an attacker who has gained access to data paths in your network to quot;listen inquot; or interpret (read) the traffic. When an attacker is eavesdropping on your communications, it is referred to as sniffing or snooping. The ability of an eavesdropper to monitor the network is generally the biggest security problem that administrators face in an enterprise. Without strong encryption services that are based on cryptography, your data can be read by others as it traverses the network.

Question No: 65

Your company requires that users type a series of characters to access the wireless network.

The series of characters must meet the following requirements:

->Contains more than 15 characters

->Contains at least one letter

->Contains at least one number

->Contains at least one symbol

Which security technology meets these requirements?

  1. WEP

  2. WPA2 PSK

  3. WPA2 Enterprise

  4. MAC filtering

Answer: B

Explanation: Pre-shared key mode (PSK, also known as Personal mode) is designed for home and small office networks that don#39;t require the complexity of an 802.1X authentication server.[9] Each wireless network device encrypts the network traffic using a 256 bit key. This key may be entered either as a string of 64 hexadecimal digits, or as a passphrase of 8 to 63 printable ASCII characters

Question No: 66

You are an intern at Wide World Importers and help manage 1000 workstations. All the workstations are members of an Active Domain.

You need to push out an internal certificate to Internet Explorer on all workstations. What is the quickest method to do this?

  1. Local policy

  2. Logon script

  3. Windows Update

  4. Group policy

Answer: A

Question No: 67

The Graphic Design Institute hires you to help them set up a server for their 20-person team.

As a general practice of hardening the server, you start by performing which two tasks? (Choose two.)

  1. Disable the guest account.

  2. Rename the admin account.

  3. Remove the account lockout policy.

  4. Format partitions with FAT32.

Answer: A,B

Question No: 68

A user who receives a large number of emails selling prescription medicine is probably receiving pharming mail.

Select the correct answer if the underlined text does not make the statement correct. Select quot;No change is neededquot; if the underlined text makes the statement correct.

  1. Malware

  2. Spoofed mail

  3. Spam

  4. No change is needed.

Answer: C

Question No: 69

You create a web server for your school. When users visit your site, they get a certificate error that says your site is not trusted.

What should you do to fix this problem?

  1. Install a certificate from a trusted Certificate Authority (CA).

  2. Use a digital signature.

  3. Generate a certificate request.

  4. Enable Public Keys on your website.

Answer: A

Question No: 70

Keeping a server updated:

  1. Maximizes network efficiency

  2. Fixes security holes

  3. Speeds up folder access

  4. Synchronizes the server

Answer: B

100% Free Download!
Download Free Demo:98-367 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 98-367 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

[Free] 2017(Sep) EnsurePass Examcollection Microsoft 98-367 Dumps with VCE and PDF 51-60

EnsurePass
2017 Sep Microsoft Official New Released 98-367
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/98-367.html

Security fundamentals

Question No: 51

You create a new file in a folder that has inheritance enabled. By default, the new file:

  1. Takes the permissions of the parent folder

  2. Does not take any permissions

  3. Takes the permissions of other folders in the same directory

  4. Takes the permissions of other files in the same directory

Answer: A

Reference: https://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en- us/acl_inherit_permissions.mspx?mfr=true

Question No: 52

E-mail spoofing:

  1. Forwards e-mail messages to all contacts

  2. Copies e-mail messages sent from a specific user

  3. Obscures the true e-mail sender

  4. Modifies e-mail routing logs

Answer: C

Reference: http://www.microsoft.com/mscorp/safety/technologies/senderid/technology.mspx

Question No: 53

Bridging is a process of sending packets from source to destination on OSI layer 3.

Select the correct answer if the underlined text does not make the statement correct. Select quot;No change is neededquot; if the underlined text makes the statement correct.

  1. Routing

  2. Switching

  3. Repeating

  4. No change is needed.

Answer: A

Question No: 54 HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Ensurepass 2017 PDF and VCE

Explanation:

C:\Users\Kamran\Desktop\image.jpg

Question No: 55

The certificate of a secure public Web server on the Internet should be:

  1. Issued by a public certificate authority (CA)

  2. Signed by using a 4096-bit key

  3. Signed by using a 1024-bit key

  4. Issued by an enterprise certificate authority (CA)

Answer: A

Question No: 56

A mail system administrator scans for viruses in incoming emails to increase the speed of mail processing.

Select the correct answer if the underlined text does not make the statement correct. Select quot;No change is neededquot; if the underlined text makes the statement correct.

  1. Decrease the chances of a virus getting to a client machine

  2. Verify that the senders of the messages are legitimate

  3. Ensure that all links in the messages are trustworthy

  4. No change is needed.

Answer: A

Question No: 57

You need to grant a set of users write access to a file on a network share. You should add the users to:

  1. A security group

  2. The Authenticated Users group

  3. The Everyone group

  4. A distribution group

Answer: B

Question No: 58

You need to prevent unauthorized users from reading a specific file on a portable computer if the portable computer is stolen.

What should you implement?

  1. File-level permissions

  2. Advanced Encryption Standard (AES)

  3. Folder-level permissions

  4. Distributed File System (DFS)

  5. BitLocker

Answer: E

Reference: http://4sysops.com/archives/seven-reasons-why-you-need-bitlocker-hard-drive- encryption-for-your-whole-organization/

Question No: 59 HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Ensurepass 2017 PDF and VCE

Explanation:

C:\Users\Kamran\Desktop\image.jpg

Question No: 60

This question requires that you evaluate the underlined text to determine if it is correct. The first line of defense against attacks from the Internet is a software firewall.

Select the correct answer if the underlined text does not make the statement correct. Select quot;No change is needed#39;#39; if the underlined text makes the statement correct.

  1. hardware firewall

  2. virus software

  3. radius server

  4. No change is needed

Answer: A

100% Free Download!
Download Free Demo:98-367 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 98-367 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

[Free] 2017(Sep) EnsurePass Examcollection Microsoft 98-367 Dumps with VCE and PDF 41-50

EnsurePass
2017 Sep Microsoft Official New Released 98-367
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/98-367.html

Security fundamentals

Question No: 41

Coho Winery wants to increase their web presence and hires you to set up a new web server. Coho already has servers for their business and would like to avoid purchasing a new one.

Which server is best to use as a web server, considering the security and performance concerns?

  1. SQL Server

  2. File Server

  3. Domain Controller

  4. Application Server

Answer: C

Question No: 42 HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Explanation:

Ensurepass 2017 PDF and VCE

C:\Users\Kamran\Desktop\image.jpg

Question No: 43

What is the standard or basic collection of NTFS permissions?

  1. Read and execute, read, write, full control, modify, list folder contents

  2. Change permissions, read permissions, write permissions

  3. Read attributes, list folder/read data, traverse folder/execute file

  4. Create files/write data, create folders/append data, take ownership

Answer: A

Reference: http://technet.microsoft.com/en-us/library/bb727008.aspx

Question No: 44

A group of users has access to Folder A and all of its contents. You need to prevent some of the users from accessing a subfolder inside Folder A.

What should you do first?

  1. Disable folder sharing

  2. Hide the folder

  3. Change the owner

  4. Block inheritance

Answer: A

Question No: 45

You need to install a domain controller in a branch office. You also need to secure the information on the domain controller. You will be unable to physically secure the server.

Which should you implement?

  1. Read-Only Domain Controller

  2. Point-to-Point Tunneling Protocol (PPTP)

  3. Layer 2 Tunneling Protocol (L2TP)

  4. Server Core Domain Controller

Answer: A Explanation:

A read-only domain controller (RODC) is a new type of domain controller in the Windows Server庐 2008 operating system. With an RODC, organizations can easily deploy a domain controller in locations where physical security cannot be guaranteed. An RODC hosts read- only partitions of the Active Directory庐 Domain Services (AD DS) database. http://technet.microsoft.com/en-us/library/cc732801(v=ws.10).aspx

Question No: 46

Physically securing servers prevents:

  1. Theft

  2. Compromise of the certificate chain

  3. Man-in-the middle attacks

  4. Denial of Service attacks

Answer: A

Question No: 47

Phishing is an attempt to:

  1. Obtain information by posing as a trustworthy entity.

  2. Limit access to e-mail systems by authorized users.

  3. Steal data through the use of network intrusion.

  4. Corrupt e-mail databases through the use of viruses.

Answer: A Explanation:

Phishing is the act of attempting to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.

Question No: 48

You are setting up Remote Desktop on your computer. Your computer is a member of a domain.

Your firewall configuration is shown in the following image:

Ensurepass 2017 PDF and VCE

You need to allow Remote Desktop to be able to get through your firewall for users on your company#39;s network.

Which settings should you enable?

  1. Remote Assistance: Home/Work (Private)

  2. Remote Desktop: Public

  3. Remote Desktop: Home/Work (Private)

  4. Remote Assistance: Domain

Answer: A

Question No: 49 HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Ensurepass 2017 PDF and VCE

Explanation:

C:\Users\Kamran\Desktop\image.jpg

Question No: 50

You are an intern and are working remotely.

You need a solution that meets the following requirements:

->Allows you to access data on the company network securely

->Gives you the same privileges and access as if you were in the office

What are two connection methods you could use? (Choose two.)

  1. Forward Proxy

  2. Virtual Private Network (VPN)

  3. Remote Access Service (RAS)

  4. Roaming Profiles

Answer: B,D

100% Free Download!
Download Free Demo:98-367 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 98-367 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

[Free] 2017(Sep) EnsurePass Examcollection Microsoft 98-367 Dumps with VCE and PDF 31-40

EnsurePass
2017 Sep Microsoft Official New Released 98-367
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/98-367.html

Security fundamentals

Question No: 31

Many Internet sites that you visit require a user name and password. How should you secure these passwords?

  1. Save them to a text file

  2. Enable session caching

  3. Configure the browser to save passwords

  4. Save them to an encrypted file

  5. Reuse the same password

Answer: D

Question No: 32

Setting a minimum password age restricts when users can:

  1. Request a password reset

  2. Change their passwords

  3. Log on by using their passwords

  4. Set their own password expiration

Answer: B Explanation:

Configure the minimum password age to be more than 0 if you want Enforce password history to be effective. Without a minimum password age, users can cycle through

passwords repeatedly until they get to an old favorite.

Question No: 33

Which enables you to change the permissions on a folder?

  1. Take ownership

  2. Extended attributes

  3. Auditing

  4. Modify

Answer: D

Question No: 34

Which is the minimum requirement to create BitLocker-To-Go media on a client computer?

  1. Windows XP Professional Service Pack 3

  2. Windows Vista Enterprise Edition

  3. Windows 7 Enterprise Edition

  4. Windows 2000 Professional Service Pack 4

Answer: A

Question No: 35

What is a service set identifier (SSID)?

  1. A wireless encryption standard

  2. The wireless LAN transmission type

  3. The broadcast name of an access point

  4. A wireless security protocol

Answer: C

Explanation:

SSID (service set identifier) is a function performed by an Access Point that transmits its name so that wireless stations searching for a network connection can #39;discover#39; it. It#39;s what allows your wireless adapter#39;s client manager program or Windows built-in wireless software to give you a list of the Access Points in range.

Question No: 36

Which provides the highest level of security in a firewall?

  1. Stateful inspection

  2. Outbound packet filters

  3. Stateless inspection

  4. Inbound packet filters

Answer: A

Question No: 37

What is a common method for password collection?

  1. Email attachments

  2. Back door intrusions

  3. SQL Injection

  4. Network sniffers

Answer: D

Question No: 38 HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Ensurepass 2017 PDF and VCE

Explanation:

C:\Users\Kamran\Desktop\image.jpg

Question No: 39

You want to make your computer resistant to online hackers and malicious software. What should you do?

  1. Configure a forward proxy.

  2. Install anti-virus software.

  3. Enable spam filtering.

  4. Turn on Windows Firewall.

Answer: B

Question No: 40

A network sniffer is software or hardware that:

  1. Records user activity and transmits it to the server

  2. Captures and analyzes network communication

  3. Protects workstations from intrusions

  4. Catalogs network data to create a secure index

Answer: B Explanation:

A network sniffer is a computer tool that captures network data in the form of low-level packets. Network sniffers can be used for technical troubleshooting and analyzing the communication.

100% Free Download!
Download Free Demo:98-367 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 98-367 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

[Free] 2017(Sep) EnsurePass Examcollection Microsoft 98-367 Dumps with VCE and PDF 21-30

EnsurePass
2017 Sep Microsoft Official New Released 98-367
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/98-367.html

Security fundamentals

Question No: 21 HOTSPOT

You are preparing a local audit policy for your workstation. No auditing is enabled. The settings of your policy are shown in the following image:

Ensurepass 2017 PDF and VCE

Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.

Ensurepass 2017 PDF and VCE

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Explanation: First answer – Audit account logon events Second answers – audit system events

Dozens of events can be audited in Windows. The events fall into several categories:

->Audit account logon events – audit each instance of a user logging on to or logging off from another computer in which this computer is used to validate the account. This event category is applicable to domain controllers only since DC’s are used to validate accounts in domains.

->Audit account management – audit each event of account management on a

computer. Examples of account maintenance include password changes, user account and group modifications.

->Audit directory service access – audit the event of a user accessing an Active

Directory object that has its own system access control list (SACL) specified.

->Audit logon events – audit each instance of a user logging on to or logging off from a computer. Note that this is different than the ‘Audit account login events’ category. This tracks the logon event to a specific server. The former tracks which domain controller authenticated the user.

->Audit object access – audit the event of a user accessing an object that has its own system access control list (SACL) specified. Examples of objects are files, folders, registry keys, printers, etc.

->Audit policy change – audit every incident of a change to user rights assignment policies, audit policies, or trust policies.

->Audit privilege use – audit each instance of a user exercising a user right.

->Audit process tracking – audit detailed tracking information for events such as program activation, process exit, handle duplication, and indirect object access.

->Audit system events – audit when a user restarts or shuts down the computer or when an event occurs that affects either the system security or the security log.

Question No: 22

Humongous Insurance is an online healthcare insurance company. During an annual security audit a security firm tests the strength of the company#39;s password policy and suggests that Humongous Insurance implement password history policy.

What is the likely reason that the security firm suggests this?

  1. Past passwords were easily cracked by the brute force method.

  2. Past passwords of users contained dictionary words.

  3. Previous password breaches involved use of past passwords.

  4. Past passwords lacked complexity and special characters.

Answer: B

Question No: 23

In Internet Explorer 8, the InPrivate Browsing feature prevents:

  1. Unauthorized private data input.

  2. Unencrypted communication between the client computer and the server.

  3. User credentials from being sent over the Internet.

  4. Any session data from being stored on the computer.

Answer: D

Reference: http://windows.microsoft.com/en-us/windows/what-is-inprivate-browsing

Question No: 24

Role separation improves server security by:

  1. Enforcing principle of least privilege.

  2. Installing applications on separate hard disks.

  3. Physically separating high security servers from other servers.

  4. Placing servers on separate VLANs.

Answer: A

Question No: 25

Network Access Protection (NAP) enables administrators to control access to network resources based on a computer#39;s:

  1. Encryption level

  2. Warranty

  3. Physical location

  4. Configuration

Answer: D

Explanation: Network Access Protection (NAP) is a new set of operating system components included with the Windows Server庐 2008 and Windows Vista庐 operating systems that provides a platform to help ensure that client computers on a private network meet administrator-defined requirements for system health. NAP policies define the required configuration and update status for a client computer’s operating system and

critical software. For example, computers might be required to have antivirus software with the latest signatures installed, current operating system updates installed, and a host- based firewall enabled. By enforcing compliance with health requirements, NAP can help network administrators mitigate some of the risk caused by improperly configured client computers that might be exposed to viruses and other malicious software.

Question No: 26

Which password attack uses all possible alpha numeric combinations?

  1. Social engineering

  2. Brute force attack

  3. Dictionary attack

  4. Rainbow table attack

Answer: C

Question No: 27 HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Ensurepass 2017 PDF and VCE

Explanation:

C:\Users\Kamran\Desktop\image.jpg

Question No: 28

A brute force attack:

  1. Uses response filtering

  2. Tries all possible password variations

  3. Uses the strongest possible algorithms

  4. Targets all the ports

Answer: B

Question No: 29 HOTSPOT

No. Each correct selection is worth one point.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Ensurepass 2017 PDF and VCE

Explanation:

C:\Users\Kamran\Desktop\image.jpg

Question No: 30

What is an example of non-propagating malicious code?

  1. A back door

  2. A hoax

  3. A Trojan horse

  4. A worm

Answer: A

100% Free Download!
Download Free Demo:98-367 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 98-367 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

[Free] 2017(Sep) EnsurePass Examcollection Microsoft 98-367 Dumps with VCE and PDF 11-20

EnsurePass
2017 Sep Microsoft Official New Released 98-367
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/98-367.html

Security fundamentals

Question No: 11

You are trying to connect to an FTP server on the Internet from a computer in a school lab. You cannot get a connection. You try on another computer with the same results. The computers in the lab are able to browse the Internet.

You are able to connect to this FTP server from home. What could be blocking the connection to the server?

  1. A layer-2 switch

  2. A wireless access point

  3. A firewall

  4. A layer-2 hub

Answer: C

Question No: 12

How does the sender policy framework (SPF) aim to reduce spoofed email?

  1. It provides a list of IP address ranges for particular domains so senders can be verified.

  2. It includes an XML policy file with each email that confirms the validity of the message.

  3. It lists servers that may legitimately forward mail for a particular domain.

  4. It provides an encryption key so that authenticity of an email message can be validated

Answer: A

Question No: 13

When conducting a security audit the first step is to:

  1. Inventory the company#39;s technology assets

  2. Install auditing software on your servers

  3. Set up the system logs to audit security events

  4. Set up a virus quarantine area

Answer: A

Question No: 14

What are three examples of two-factor authentication? (Choose three.)

  1. A fingerprint and a pattern

  2. A password and a smart card

  3. A username and a password

  4. A password and a pin number

  5. A pin number and a debit card

Answer: A,B,E Explanation:

At minimum two-factor authentication requires two out of three regulatory-approved

authentication variables such as:

->Something you know (like the PIN on your bank card or email password).

->Something you have (the physical bank card or a authenticator token).

->Something you are (biometrics like your finger print or iris pattern).

Question No: 15

Cookies impact security by enabling: (Choose two.)

  1. Storage of Web site passwords.

  2. Higher security Web site protections.

  3. Secure Sockets Layer (SSL).

  4. Web sites to track browsing habits.

Answer: A,D

Reference: http://en.wikipedia.org/wiki/HTTP_cookie

Question No: 16

The manager of a coffee shop hires you to securely set up WiFi in the shop.

To keep computer users from seeing each other, what should you use with an access point?

  1. Client bridge mode

  2. Client isolation mode

  3. MAC address filtering

  4. Client mode

Answer: B Explanation:

Wireless Client Isolation is a unique security feature for wireless networks. When Client Isolation is enabled any and all devices connected to the wireless LAN will be unable to talk to each other.

Question No: 17

The client computers on your network are stable and do not need any new features. Which is a benefit of applying operating system updates to these clients?

  1. Keep the software licensed

  2. Keep the server ports available

  3. Update the hardware firewall

  4. Close existing vulnerabilities

Answer: D

Question No: 18

You are an intern at Litware, Inc. Your manager asks you to make password guess attempts harder by limiting login attempts on company computers.

What should you do?

  1. Enforce password sniffing.

  2. Enforce password history.

  3. Make password complexity requirements higher.

  4. Implement account lockout policy.

Answer: D

Reference: http://technet.microsoft.com/en-us/library/dd277400.aspx

Question No: 19

You need to limit the programs that can run on client computers to a specific list.

Which technology should you implement?

  1. Windows Security Center

  2. Security Accounts Manager

  3. System Configuration Utility

  4. AppLocker group policies

Answer: A

Question No: 20 HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Explanation:

Ensurepass 2017 PDF and VCE

C:\Users\Kamran\Desktop\image.jpg

100% Free Download!
Download Free Demo:98-367 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 98-367 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

[Free] 2017(Sep) EnsurePass Examcollection Microsoft 98-367 Dumps with VCE and PDF 1-10

EnsurePass
2017 Sep Microsoft Official New Released 98-367
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/98-367.html

Security fundamentals

Question No: 1

Which enables access to all of the logged-in user#39;s capabilities on a computer?

  1. Java applets

  2. ActiveX controls

  3. Active Server Pages (ASP)

  4. Microsoft Silverlight

Answer: B

Question No: 2

E-mail bombing attacks a specific entity by:

  1. Redirecting all e-mail to another entity

  2. Sending high volumes of e-mail

  3. Tracing e-mail to the destination address

  4. Triggering high levels of security alerts

Answer: B Explanation:

In Internet usage, an email bomb is a form of net abuse consisting of sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted in a denial-of-service attack.

Question No: 3 HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Ensurepass 2017 PDF and VCE

Explanation:

C:\Users\Kamran\Desktop\image.jpg

Biometric devices, such as finger scanners consist of a reader or scanning device, Software that converts the scanned information into digital form and compares match points, and a database that stores the biometric data for comparison. To prevent identity theft, biometric data is usually encrypted when it is gathered.

Question No: 4

What is the primary advantage of using Active Directory Integrated Zones?

  1. Zone encryption

  2. Password protection

  3. Non-repudiation

  4. Secure replication

Answer: D

Reference: http://books.google.com/books?id=CXy- 2LBZCVgCamp;pg=PA201amp;dq=”Active Directory Integrated Zones”, Secure replicat ionamp;hl=enamp;sa=Xamp;ei=9s92U-v1KI- zyASjzILIDgamp;ved=0CE0Q6AEwAQ#v=onepageamp;q=”Active Directory Integrated

Zones”, Secure replicationamp;f=false

Question No: 5

The primary method of authentication in an SSL connection is passwords.

To answer, choose the option quot;No change is neededquot; if the underlined text is correct. If the underlined text is not correct, choose the correct answer.

  1. No change is needed

  2. Certificates

  3. IPsec

  4. Biometrics

Answer: B

Reference: https://www.geocerts.com/ssl/understanding_authentication

Question No: 6

To implement WPA2 Enterprise, you would need a/an:

  1. RADIUS server

  2. SSL server

  3. WEP server

  4. VPN server

Answer: A

Question No: 7 HOTSPOT

You are at school and logged in to a Windows 7 computer using a standard user account.

You need to change some of the properties of a desktop icon for an assignment. Your instructor provides you with an administrator username and password and asks you to do two tasks.

When you open the Need Admin Access Properties window, you see the following image:

Ensurepass 2017 PDF and VCE

Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.

Ensurepass 2017 PDF and VCE

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Ensurepass 2017 PDF and VCE

Explanation:

C:\Users\Kamran\Desktop\image.jpg

Question No: 8

To protect systems from buffer overflow errors, you can use:

  1. Antivirus software

  2. Data Execution Prevention

  3. A proxy server

  4. An Intruder Prevention System

Answer: B

Question No: 9

Password history policies are used to prevent:

  1. Brute force attacks

  2. Users from sharing passwords

  3. Social engineering

  4. Passwords from being reused immediately

Answer: D Explanation:

This security setting determines the number of unique new passwords that have to be associated with a user account before an old password can be reused. The value must be between 0 and 24 passwords.

This policy enables administrators to enhance security by ensuring that old passwords are not reused continually.

Reference: http://technet.microsoft.com/en-us/library/cc758950(v=ws.10).aspx

Question No: 10 HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Ensurepass 2017 PDF and VCE

Explanation:

C:\Users\Kamran\Desktop\image.jpg

100% Free Download!
Download Free Demo:98-367 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 98-367 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE