aiotestking uk

98-367 Exam Questions - Online Test


98-367 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. What are the main classes of biometric characteristics? Each correct answer represents a complete solution. Choose two. 

A. Psychological

B. Behavioral 

C. Fundamental 

D. Physiological 

Answer: BD 

Q2. Which of the following operating systems have Windows Security Health Agent (SHA) on computers and report their status to the Security Health Validator (SHV)? Each correct answer represents a complete solution. Choose three. 

A. Windows 2000 Professional 

B. Windows Vista Business 

C. Windows XP Service Pack 3 

D. Windows 7 Professional 

Answer: BCD 

Q3. You work as an Exchange Administrator for TechWorld Inc. The company has a Windows 2008 Active Directory-based network. The network contains an Exchange Server 2010 organization. You are in the process of choosing an authentication method for Exchange ActiveSync. You need an authentication method that requires both, a password and an external device. Which of the following authentication methods will you choose for Exchange ActiveSync? 

A. Device-based authentication 

B. Basic authentication 

C. Certificate-based authentication 

D. Token-based authentication 

Answer:

Q4. Which of the following is the process of keeping track of a user's activity while accessing network resources? 

A. Authentication 

B. Auditing 

C. Spoofing 

D. Biometrics 

Answer:

Q5. Which of the following can be implemented to decrease the number of times a user is required to be authenticated for access a particular resource? 

A. TCP/IP protocol 

B. Network Directory Access Protocol 

C. Kerberos 

D. Single Sign-on (SSO) 

Answer:

Q6. Mark works as a Systems Administrator for TechMart Incl. The company has Windows-based network. Mark has been assigned a project to track who tries to log into the system and the time of the day at which the attempts occur. He is also required to create a system to track when confidential files are opened and who is trying to open it. Now, Mark logs when someone is not able to make a successful attempt to log into the system as Administrator but he also wants to log when the user is successful to log into the system as Administrator. Which of the following is the reason of logging by Mark when a user is successfully logged into the system as well as when he is failed? 

A. To determine if and when someone is authenticating successfully with high privilege. 

B. To make sure that user is not using the Administrator account. 

C. To determine if and when someone is authenticating successfully with high privilege. 

D. To make sure that user is not facing any problem. 

Answer: