aiotestking uk

98-367 Exam Questions - Online Test


98-367 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Which of the following actions should be taken so that the computer requires confirmation before installing an ActiveX component?

A. Configuring a firewall on the network

B. Configuring the settings on the Web Browser

C. Installing an anti-virus software

D. Configuring DMZ on the network

Answer:

Q2. Which of the following protects against unauthorized access to confidential information via encryption and works at the network layer?

A. Firewall

B. NAT 

C. IPSec 

D. MAC address 

Answer:

Q3. Which of the following is a tool that can be used to evaluate the servers having vulnerabilities that are related to the operating system and installed software? 

A. DNS dynamic update 

B. Windows Software Update Services 

C. Read-Only domain controller (RODC) 

D. Microsoft Baseline Security Analyzer 

Answer:

Q4. Which of the following is a technique used to attack an Ethernet wired or wireless network? 

A. ARP poisoning 

B. DNS poisoning 

C. Mail bombing 

D. Keystroke logging 

Answer:

Q5. Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network. The company is adding an open, high-speed, wireless access for their customers and secured wireless for employees at all 37 branches. He wants to check the various security concerns for ensuring that business traffic is secured. He is also under pressure to make this new feature a winning strategy for a company. 

In which of the following ways can Mark add another level of security after implanting encryption techniques for the business wireless traffic? Each correct answer represents a complete solution. Choose all that apply. 

A. Hide the Service Set Identifier (SSID) 

B. Configure the network to use only Extensible Authentication Protocol (EAP) 

C. Implement access point isolation and 

D. Use MAC filtering 

Answer: AC 

Q6. Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to implement stronger authentication measures for the customers, as well as eliminate IT staff from logging on with high privileges. Mark has various options, but he is required to keep the processes easy for the helpdesk staff. Which of the following is a service can the staff uses as an alternative of signing in with elevate privileges? 

A. Secondary Logon-Run As 

B. Security log 

C. Hardware firewall 

D. Encrypted network configuration 

Answer:

Q7. You work as an Exchange Administrator for UniCom Inc. The company has a Windows 2003 Active Directory-based network. The network contains an Exchange Server 2007 organization. You have deployed a DNS server in your messaging organization. The DNS server hosting the DNS zone data for the Exchange Server is not capable of processing dynamic DNS updates. You decide to troubleshoot DNS. Which of the following utilities will you use to identify anomalies of records in the targeted DNS zone?

A. Nslookup.exe

B. IPCONFIG

C. DNSCMD.exe

D. DNSLint

Answer: D

Q8. Which of the following is the process used by attackers for listening to the network traffic? 

A. Eavesdropping 

B. Subnetting 

C. Sanitization 

D. Hacking 

Answer:

Q9. Which of the following is used to create a secured connection over an unsecured network? 

A. TCP/IP protocol 

B. Virtual Private Network (VPN) 

C. Single Sign-on (SSO) 

D. Kerberos 

Answer:

Q10. Which of the following is an authentication protocol? 

A. Kerberos 

B. LDAP 

C. TLS 

D. PPTP 

Answer: