[Free] Download New Updated (December) Microsoft 98-367 Exam Questions 11-20

Ensurepass

QUESTION 11

Dumpster diving refers to a physical threat that a hacker might use to look for information about a computer network.

 

Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.

 

A.

Phishing

B.

Malware

C.

Reverse Social engineering

D.

No change is needed

 

Correct Answer: D

 

 

QUESTION 12

Password history policies are used to prevent:

 

A.

Brute force attacks

B.

Users from sharing passwords

C.

Social engineering

D.

Passwords from being reused immediately

 

Correct Answer: D

Explanation:

This security setting determines the number of unique new passwords that have to be associated with a user account before an old password can be reused. The value must be between 0 and 24 passwords.

This policy enables administrators to enhance security by ensuring that old passwords are not reused continually.

Reference: http://technet.microsoft.com/en-us/library/cc758950(v=ws.10).aspx

 

 

QUESTION 13

HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

 

clip_image002

 

Correct Answer:

clip_image004

 

 

QUESTION 14

You want to make your computer resistant to online hackers and malicious software. What should you do?

 

A.

Configure a forward proxy.

B.

Install anti-virus software.

C.

Enable spam filtering.

D.

Turn on Windows Firewall.

 

Correct Answer: B

 

 

QUESTION 15

What is the standard or basic collection of NTFS permissions?

 

A.

Read and execute, read, write, full control, modify, list folder contents

B.

Change permissions, read permissions, write permissions

C.

Read attributes, list folder/read data, traverse folder/execute file

D.

Create files/write data, create folders/append data, take ownership

 

Correct Answer: A

Explanation:

http://technet.microsoft.com/en-us/library/bb727008.aspx

 

 

 

 

 

 

 

 

 

 

 

 

 

QUESTION 16

HOTSPOT

Alice and Bob are exchanging messages with each other. Chuck modifies the messages sent between Alice and Bob as shown in the following image:

 

clip_image006

 

Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.

 

clip_image008

 

Correct Answer:

clip_image010

 

 

 

 

 

 

QUESTION 17

When conducting a security audit the first step is to:

 

A.

Inventory the company’s technology assets

B.

Install auditing software on your servers

C.

Set up the system logs to audit security events

D.

Set up a virus quarantine area

 

Correct Answer: A

 

 

QUESTION 18

The primary purpose of Network Access Protection (NAP) is to prevent:

 

A.

Loss of data from client computers on a network.

B.

Non-compliant systems from connecting to a network.

C.

Users on a network from installing software.

D.

Unauthorized users from accessing a network.

 

Correct Answer: B

Explanation:

NAP enforces health policies by inspecting and assessing the health of client computers, restricting network access when client computers are noncompliant with health policy, and remediating noncompliant client computers to bring them into compliance with health policy before they are granted full network access. NAP enforces health policies on client computers that are attempting to connect to a network; NAP also provides ongoing health compliance enforcement while a client computer is connected to a network.

Reference: http://technet.microsoft.com/en-us/library/cc754378(v=ws.10).aspx

 

 

QUESTION 19

You are volunteering at an organization that gets a br
and new web server. To make the server more secure, you should add a second administrator account.

 

Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.

 

A.

Disable unused services

B.

Enable LM authentication

C.

Enable NTLM authentication

D.

No change is needed.

 

Correct Answer: A

 

 

QUESTION 20

You have a Windows 7 desktop computer, and you create a Standard User account for your roommate so that he can use the desktop from time to time. Your roommate has forgotten his password. Which two actions can you take to reset the password? (Choose two.)

 

A.

Use your password reset disk.

B.

Use your administrator account.

C.

Boot into Safe Mode with your roommate’s account.

D.

From your roommate’s account press CTRL+ALT+DELETE, and then click Change a password.

 

Correct Answer: AB

 

Free VCE & PDF File for Microsoft 98-367 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…