[Free] Download New Updated (December) Microsoft 98-367 Exam Questions 61-70

EnsurepassQUESTION 61 What is a service set identifier (SSID)?   A. A wireless encryption standard B. The wireless LAN transmission type C. The broadcast name of an access point D. A wireless security protocol   Correct Answer: C Explanation: SSID (service set identifier) is a function performed by an Access Point that transmits its name so that wireless stations searching for a network connection can ‘discover’ it. It’s what allows your wireless adapter’s client manager program Read more […]

[Free] Download New Updated (December) Microsoft 98-367 Exam Questions 71-80

EnsurepassQUESTION 71 You need to limit the programs that can run on client computers to a specific list. Which technology should you implement?   A. Windows Security Center B. Security Accounts Manager C. System Configuration Utility D. AppLocker group policies Correct Answer: A     QUESTION 72 Which two security settings can be controlled by using group policy? (Choose two.)   A. Password complexity B. Access to the Run… command C. Automatic file locking Read more […]

[Free] Download New Updated (December) Microsoft 98-367 Exam Questions 51-60

EnsurepassQUESTION 51 Phishing is an attempt to:   A. Obtain information by posing as a trustworthy entity. B. Limit access to e-mail systems by authorized users. C. Steal data through the use of network intrusion. D. Corrupt e-mail databases through the use of viruses.   Correct Answer: A Explanation: Phishing is the act of attempting to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as Read more […]

[Free] Download New Updated (December) Microsoft 98-367 Exam Questions 31-40

EnsurepassQUESTION 31 Which enables you to change the permissions on a folder?   A. Take ownership B. Extended attributes C. Auditing D. Modify   Correct Answer: D     QUESTION 32 What are three examples of two-factor authentication? (Choose three.)   A. A fingerprint and a pattern B. A password and a smart card C. A username and a password D. A password and a pin number E. A pin number and a debit card   Correct Answer: ABE Explanation: Read more […]

[Free] Download New Updated (December) Microsoft 98-367 Exam Questions 21-30

EnsurepassQUESTION 21 You need to install a domain controller in a branch office. You also need to secure the information on the domain controller. You will be unable to physically secure the server. Which should you implement?   A. Read-Only Domain Controller B. Point-to-Point Tunneling Protocol (PPTP) C. Layer 2 Tunneling Protocol (L2TP) D. Server Core Domain Controller   Correct Answer: A Explanation: A read-only domain controller (RODC) is a new type of domain controller Read more […]

[Free] Download New Updated (December) Microsoft 98-367 Exam Questions 11-20

EnsurepassQUESTION 11 Dumpster diving refers to a physical threat that a hacker might use to look for information about a computer network.   Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.   A. Phishing B. Malware C. Reverse Social engineering D. No change is needed   Correct Answer: D     QUESTION 12 Password history policies are used to prevent: Read more […]

[Free] Download New Updated (December) Microsoft 98-367 Exam Questions 41-50

EnsurepassQUESTION 41 What is a common method for password collection?   A. Email attachments B. Back door intrusions C. SQL Injection D. Network sniffers   Correct Answer: D                                     QUESTION 42 HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.     Correct Read more […]

[Free] Download New Updated (December) Microsoft 98-367 Exam Questions 1-10

EnsurepassQUESTION 1 To implement WPA2 Enterprise, you would need a/an:   A. RADIUS server B. SSL server C. WEP server D. VPN server   Correct Answer: A     QUESTION 2 Passwords that contain recognizable words are vulnerable to a:   A. Denial of Service attack B. Hashing attack C. Dictionary attack D. Replay attack   Correct Answer: C Explanation: A dictionary attack is a method of breaking into a password-protected computer or server by systematically Read more […]