aiotestking uk

98-367 Exam Questions - Online Test


98-367 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Which of the following is used to describe the policy of maximum password age?

A. It is used to determine how old the user has to create a password.

B. It is a time duration before a password is required to be public.

C. It is a time duration before a password is required to be changed.

D. It determines how old the password must be before the user is permitted to change it.

Answer: C

Q2. On which of the following is the level of security set for an Internet zone applied? 

A. To the sites that you have specifically indicated as the ones that you trust. 

B. To all the Websites by default. 

C. To the sites that might potentially damage your computer, or your information. 

D. To the Websites and content that are stored on a corporate or business network. 

Answer:

Q3. By default, what level of security is set for the Local intranet zone? 

A. High-Medium 

B. Medium-Low 

C. High 

D. Low 

Answer:

Q4. Which of the following are required to enable for preventing the users from downloading and installing software from the Internet? Each correct answer represents a complete solution. Choose all that apply. 

A. Software restriction policies 

B. PTR record 

C. User Account Control 

D. Anti-Virus software 

Answer: AC

Q5. Which of the following is a central, secure database in which Windows stores all hardware configuration information, software configuration information, and system security policies? 

A. Registry 

B. Program files folder 

C. DLL file 

D. Configuration file 

Answer:

Q6. Which of the following is a disadvantage of using biometric identification?

A. It breaks the several firewall security rules.

B. It needs a new network configuration of the entire infrastructure.

C. It can be faked and will not be trusted by several organizations.

D. It is expensive and cannot be afforded by several organizations

Answer: D

Q7. Which of the following terms refers to the access of a wireless Internet connection by bringing one's own computer within the range of another's wireless connection, and using that service without the subscriber's explicit permission or knowledge?

A. Samhain

B. Snooping

C. Piggybacking

D. Vampire tap

Answer: C

Q8. Which of the following security zones is used for Web sites that the user does not trust? 

A. Internet zone 

B. Trusted zone 

C. Restricted zone 

D. Local Intranet zone 

Answer:

Q9. You want to standardize security throughout your network. You primarily use Microsoft operating systems for servers and workstations. What is the best way to have standardized security (i.e. same password policies, lockout policies, etc.) throughout the network on clients and servers? 

A. Publish the desired policies to all employees directing them to implement according to policy. 

B. Configure each computer to adhere to the standard policies. 

C. When installing new workstations or servers, image a machine that has proper security settings and install the new machine with that image. 

D. Utilize Windows Security Templates for all computers. 

Answer:

Q10. Which of the following functions are performed by a firewall? Each correct answer represents a complete solution. Choose all that apply. 

A. It blocks unwanted traffic. 

B. It hides vulnerable computers that are exposed to the Internet. 

C. It enhances security through various methods, including packet filtering, circuit-level filtering, and application filtering. 

D. It logs traffic to and from the private network. 

Answer: ABCD