aiotestking uk

98-367 Exam Questions - Online Test


98-367 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Which of the following are the main features of a key logger? Each correct answer represents a complete solution. Choose all that apply. 

A. It can be delivered via FTP or e-mail. 

B. It can record all keystrokes. 

C. It can capture all screenshots. 

D. It can detect viruses on the computer. 

Answer: ABC 

Q2. Which of the following services does IPSec provide for protecting data? Each correct answer represents a complete solution. Choose two. 

A. Network authentication 

B. Encryption 

C. Data authentication 

D. Compression 

Answer: BC 

Q3. Which of the following ports is used by the IMAP4 protocol? 

A. 443 

B. 53 

C. 143 

D. 110 

Answer:

Q4. Which of the following can be installed and configured to prevent suspicious emails from entering the user's network?

A. Kerberos

B. Single sign-on (SSO)

C. TCP/IP protocol

D. Microsoft Forefront and Threat Management Gateway

Answer:

Q5. You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network. You plan to connect your company's LAN to the Internet. You are concerned about the security of your network and want to protect it against external access and misuse. Which device will you install between your LAN and the Internet to accomplish this? 

Answer:  

Q6. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution. Choose two. 

A. It allows the computers in a private network to share a global, ISP assigned address to connect to the Internet. 

B. It provides added security by using Internet access to deny or permit certain traffic from the Bastion Host. 

C. It allows external network clients access to internal services. 

D. It reduces the need for globally unique IP addresses. 

Answer: AD 

Q7. Mark work as a System Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to allow the remote travel agents to be able to access the corporate network so that they are free to check email and post appointments that are booked for the particular day. Mark has decided to permit the travel agents to use their home computers but he is required to be assured that the information is not compromised by anyone because the security of client information is on the top priority for him. Which of the following will Mark use to accomplish the task? 

A. Implement the principle of least privilege that permits the travel agents for remote access. 

B. Implement a Wi-Fi Protected Access that permits the travel agents for remote access. 

C. Implement a Wired Equivalent Privacy that permits the travel agents for remote access. 

D. Implement a VPN server that permits the travel agents for remote access. 

Answer:

Q8. Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?

A. Static NAT

B. Port Address Translation (PAT)

C. Dynamic NAT

D. Cache NAT

Answer: C

Q9. Which of the following security features of IE 7+ helps determine whether a Web site is a legitimate site? 

A. Protected mode

B. Pop-up blocker 

C. Security zones 

D. Phishing filter 

Answer:

Q10. Which of the following are the uses of Network Access Protection (NAP)? 

Each correct answer represents a complete solution. Choose all that apply. 

A. It is used to protect against virus. 

B. It is used to verify the complete integrity of each device. 

C. It permits a user to access all computers and systems where he got a access permission, without entering passwords for multiple times 

D. It is used to authenticate a request for a service in a computer network. 

Answer: AB