[Free] Download New Updated (December) Microsoft 98-367 Exam Questions 71-80

Ensurepass

QUESTION 71

You need to limit the programs that can run on client computers to a specific list. Which technology should you implement?

 

A.

Windows Security Center

B.

Security Accounts Manager

C.

System Configuration Utility

D.

AppLocker group policies

Correct Answer: A

 

 

QUESTION 72

Which two security settings can be controlled by using group policy? (Choose two.)

 

A.

Password complexity

B.

Access to the Run… command

C.

Automatic file locking

D.

Encrypted access from a smart phone

 

Correct Answer: AB

Explanation:

http://technet.microsoft.com/en-us/library/cc875814.aspx

 

 

QUESTION 73

HOTSPOT

You are preparing a local audit policy for your workstation. No auditing is enabled.

 

The settings of your policy are shown in the following image:

 

clip_image002

 

Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.

 

clip_image004

 

Correct Answer:

clip_image006

 

 

QUESTION 74

Creating MD5 hash for files is an example of ensuring what?

 

A.

Confidentiality

B.

Availability

C.

Least privilege

D.

Integrity

 

Correct Answer: D

Explanation:

The MD5 message-digest algorithm is a widely used cryptographic hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. MD5 has been utilized in a wide variety of cryptographic applications, and is also commonly used to verify data integrity.

 

 

 

 

QUESTION 75

The manager of a coffee shop hires you to securely set up WiFi in the shop. To keep computer users from seeing each other, what should you use with an access point?

 

A.

Client bridge mode

B.

Client isolation mode

C.

MAC address filtering

D.

Client mode

 

Correct Answer: B

Explanation:

Wireless Client Isolation is a unique security feature for wireless networks. When Client Isolation is enabled any and all devices connected to the wireless LAN will be unable to talk to each other.

 

 

QUESTION 76

The client computers on your network are stable and do not need any new features. Which is a benefit of applying operating system updates to these clients?

 

A.

Keep the software licensed

B.

Keep the server ports available

C.

Update the hardware firewall

D.

Close existing vulnerabilities

 

Correct Answer: D

 

 

QUESTION 77

HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

 

clip_image007

 

Correct Answer:

clip_image008

 

 

QUESTION 78

Network Access Protection (NAP) enables administrators to control access to network resources based on a computer’s:

 

A.

Encryption level

B.

Warranty

C.

Physical location

D.

Configuration

 

Correct Answer: D

Explanation:

Network Access Protection (NAP) is a new set of operating system components included with the Windows Server┬« 2008 and Windows Vista┬« operating systems that provides a platform to help ensure that client computers on a private network meet administrator-defined requirements for system health. NAP policies define the required configuration and update status for a client computer’s operating system and critical software. For example, computers might be required to have antivirus software with the latest signatures installed, current operating system updates installed, and a host- based firewall enabled. By enforcing compliance with health requirements, NAP can help network administrators mitigate some of the risk caused by improperly configured client computers that might be exposed to viruses and other malicious software.

 

 

QUESTION 79

Humongous Insurance is an online healthcare insurance company. During an annual security audit a security firm tests the strength of the company’s password policy and suggests that Humongous Insurance implement password history policy. What is the likely reason that the security firm suggests this?

 

A.

Past passwords were easily cracked by the brute force method.

B.

Past passwords of users contained dictionary words.

C.

Previous password breaches involved use of past passwords.

D.

Past passwords lacked complexity and special characters.

 

Correct Answer: B

 

 

 

 

QUESTION 80

HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

 

clip_image010

 

Correct Answer:

clip_image012

 

Free VCE & PDF File for Microsoft 98-367 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…