[Free] Download New Updated (December) Microsoft 98-367 Exam Questions 31-40

Ensurepass

QUESTION 31

Which enables you to change the permissions on a folder?

 

A.

Take ownership

B.

Extended attributes

C.

Auditing

D.

Modify

 

Correct Answer: D

 

 

QUESTION 32

What are three examples of two-factor authentication? (Choose three.)

 

A.

A fingerprint and a pattern

B.

A password and a smart card

C.

A username and a password

D.

A password and a pin number

E.

A pin number and a debit card

 

Correct Answer: ABE

Explanation:

At minimum two-factor authentication requires two out of three regulatory-approved authentication variables such as:

Something you know (like the PIN on your bank card or email password). Something you have (the physical bank card or a authenticator token). Something you are (biometrics like your finger print or iris pattern).

 

 

QUESTION 33

Which password attack uses all possible alpha numeric combinations?

 

A.

Social engineering

B.

Brute force attack

C.

Dictionary attack

D.

Rainbow table attack

 

Correct Answer: C

 

 

QUESTION 34

The Windows Firewall protects computers from unauthorized network connections.

 

Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.

 

A.

Email viruses

B.

Phishing scams

C.

Unencrypted network access

D.

No change is needed

 

Correct Answer: D

 

QUESTION 35

E-mail bombing attacks a specific entity by:

 

A.

Redirecting all e-mail to another entity

B.

Sending high volumes of e-mail

C.

Tracing e-mail to the destination address

D.

Triggering high levels of security alerts

 

Correct Answer: B

Explanation:

In Internet usage, an email bomb is a form of net abuse consisting of sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted in a denial-of-service attack.

 

 

QUESTION 36

Which enables access to all of the logged-in user’s capabilities on a computer?

 

A.

Java applets

B.

ActiveX controls

C.

Active Server Pages (ASP)

D.

Microsoft Silverlight

 

Correct Answer: B

 

 

QUESTION 37

You suspect a user’s computer is infected by a virus. What should you do first?

 

A.

Restart the computer in safe mode

B.

Replace the computer’s hard disk drive

C.

Disconnect the computer from the network

D.

Install antivirus software on the computer

 

Correct Answer: D

 

 

QUESTION 38

Which technology enables you to filter communications between a program and the Internet?

 

A.

RADIUS server

B.

Antivirus software

C.

Software firewall

D.

BitLocker To Go

 

Correct Answer: C

Explanation:

There are two types of firewalls the Hardware Firewall and the Software Firewall. A Software Firewall is a software program and a Hardware Firewall is a piece of hardware. Both have the same objective of filtering communications over a system.

 

 

 

QUESTION 39

HOTSPOT

Your supervisor asks you to review file permission settings on the application.bat file.

 

You need to report which file system the file is on and the type of permission the file has.

 

You review the application Properties dialog box shown in the following image:

 

clip_image002

 

Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.

 

clip_image004

 

Correct Answer:

clip_image006

 

 

QUESTION 40

Many Internet sites that you visit require a user name and password. How should you secure these passwords?

 

A.

Save them to a text file

B.

Enable session caching

C.

Configure the browser to save passwords

D.

Save them to an encrypted file

E.

Reuse the same password

 

Correct Answer: D

 

Free VCE & PDF File for Microsoft 98-367 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…