aiotestking uk

98-367 Exam Questions - Online Test


98-367 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Which of the following is method that can be used to identify Internet software in Software Restriction Policies? 

A. Restriction rule 

B. Identification rule 

C. Internet rule 

D. Zone rule 

Answer:

Q2. Which of the following infects the computer and then hides itself from detection by antivirus software?

A. EICAR virus

B. Boot-sector virus

C. Macro virus

D. Stealth virus

Answer:

Q3. Which of the following types of attack is used to configure a computer to behave as another computer on a trusted network by using the IP address or the physical address? 

A. Distributed denial of service (DDOS) attack 

B. Honeypot 

C. RIP/SAP Spoofing 

D. Identity spoofing 

Answer:

Q4. Which of the following root keys stores information about registered applications? 

A. HKEY_USERS 

B. HKEY_CLASSES_ROOT 

C. HKEY_CURRENT_CONFIG 

D. HKEY_CURRENT_USER 

Answer:

Q5. Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to implement stronger authentication measures for the customers, as well as eliminate IT staff from logging on with high privileges. Mark has various options, but he is required to keep the processes easy for the helpdesk staff. Which of the following is a service can the staff uses as an alternative of signing in with elevate privileges? 

A. Secondary Logon-Run As 

B. Security log 

C. Hardware firewall 

D. Encrypted network configuration 

Answer:

Q6. Which of the following is a process in which data is changed before or while it is entered into a computer system? 

A. Data diddling 

B. Authentication 

C. Domain kiting 

D. Packet sniffing 

Answer: