[Free] Download New Updated (December) Microsoft 98-367 Exam Questions 21-30

Ensurepass

QUESTION 21

You need to install a domain controller in a branch office. You also need to secure the information on the domain controller. You will be unable to physically secure the server. Which should you implement?

 

A.

Read-Only Domain Controller

B.

Point-to-Point Tunneling Protocol (PPTP)

C.

Layer 2 Tunneling Protocol (L2TP)

D.

Server Core Domain Controller

 

Correct Answer: A

Explanation:

A read-only domain controller (RODC) is a new type of domain controller in the Windows Server® 2008 operating system. With an RODC, organizations can easily deploy a domain controller in locations where physical security cannot be guaranteed. An RODC hosts read-only partitions of the Active Directory® Domain Services (AD DS) database.

http://technet.microsoft.com/en-us/library/cc732801(v=ws.10).aspx

 

 

QUESTION 22

The company that you work for wants to set up a secure network, but they do not have any servers. Which three security methods require the use of a server? (Choose three.)

 

A.

802.1x

B.

WPA2 Personal

C.

WPA2 Enterprise

D.

RADIUS

E.

802.11ac

 

Correct Answer: ACD

 

 

QUESTION 23

E-mail spoofing:

 

A.

Forwards e-mail messages to all contacts

B.

Copies e-mail messages sent from a specific user

C.

Obscures the true e-mail sender

D.

Modifies e-mail routing logs

 

Correct Answer: C

Explanation:

http://www.microsoft.com/mscorp/safety/technologies/senderid/technology.mspx

 

 

 

 

 

 

QUESTION 24

You are an intern at Litware, Inc. Your manager asks you to make password guess attempts harder by limiting login attempts on company computers. What should you do?

 

A.

Enforce password sniffing.

B.

Enforce password history.

C.

Make password complexity requirements higher.

D.

Implement account lockout policy.

 

Correct Answer: D

Explanation:

http://technet.microsoft.com/en-us/library/dd277400.aspx

 

 

QUESTION 25

You need to prevent unauthorized users from reading a specific file on a portable computer if the portable computer is stolen. What should you implement?

 

A.

File-level permissions

B.

Advanced Encryption Standard (AES)

C.

Folder-level permissions

D.

Distributed File System (DFS)

E.

BitLocker

 

Correct Answer: E

Explanation:

http://4sysops.com/archives/seven-reasons-why-you-need-bitlocker-hard-drive-encryption-for-your-whole-organization/

 

 

QUESTION 26

Your password is 1Vu*cI!8sT. Which attack method is your password vulnerable to?

 

A.

Rainbow table

B.

Brute force

C.

Spidering

D.

Dictionary

 

Correct Answer: A

 

 

QUESTION 27

What are three major attack vectors that a social engineering hacker may use? (Choose three.)

 

A.

Telephone

B.

Reverse social engineering

C.

Waste management

D.

Honey pot systems

E.

Firewall interface

 

Correct Answer: ABC

 

 

QUESTION 28

You are an intern and are working remotely.

 

You need a solution that meets the following requirements:

 

Allows you to access data on the company network securely Gives you the same privileges and access as if you were in the office

 

What are two connection methods you could use? (Choose two.)

 

A.

Forward Proxy

B.

Virtual Private Network (VPN)

C.

Remote Access Service (RAS)

D.

Roaming Profiles

 

Correct Answer: BD

 

 

QUESTION 29

Which attack listens to network traffic of a computer resource?

 

A.

Resource gathering

B.

Denial of service

C.

ARP poisoning

D.

Eavesdropping

E.

Logic bomb

 

Correct Answer: D

Explanation:

Eavesdropping

In general, the majority of network communications occur in an unsecured or “cleartext” format, which allows an attacker who has gained access to data paths in your network to “listen in” or interpret (read) the traffic. When an attacker is eavesdropping on your communications, it is referred to as sniffing or snooping. The ability of an eavesdropper to monitor the network is generally the biggest security problem that administrators face in an enterprise. Without strong encryption services that are based on cryptography, your data can be read by others as it traverses the network.

 

 

QUESTION 30

Which of the following describes a VLAN?

 

A.

It connects multiple networks and routes data packets.

B.

It is a logical broadcast domain across physical subnets.

C.

It is a subnetwork that reveals a company’s externally facing resources to the public network.

D.

It allows different network protocols to communicate between different network segments.

 

Correct Answer: B

Explanation:

VLAN (Virtual Local Network) is a logically separate IP subnetwork which allow multiple IP networks and subnets to exist on the same-switched network. VLAN is a logical broadcast domain that can span multiple physical LAN segments. It is a modern way administrators configure switches into virtual local-area networks (VLANs) to improve network performance by separating large Layer 2 broadcast domains into smaller ones.

 

Free VCE & PDF File for Microsoft 98-367 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…