aiotestking uk

98-367 Exam Questions - Online Test


98-367 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network. The company is adding an open, high-speed, wireless access for their customers and secured wireless for employees at all 37 branches. He wants to check the various security concerns for ensuring that business traffic is secured. He is also under pressure to make this new feature a winning strategy for a company. 

In which of the following ways can Mark add another level of security after implanting encryption techniques for the business wireless traffic? Each correct answer represents a complete solution. Choose all that apply. 

A. Hide the Service Set Identifier (SSID) 

B. Configure the network to use only Extensible Authentication Protocol (EAP) 

C. Implement access point isolation and 

D. Use MAC filtering 

Answer: AC 

Q2. Which of the following can be used to implement two-factor authentications? Each correct answer represents a complete solution. Choose all that apply. 

A. Firewall security rule 

B. Password 

C. Smart card 

D. Encrypted network configuration 

Answer: BC 

Q3. Which of the following protocols transmits user credentials as plaintext?

A. CHAP

B. MS-CHAP v2

C. PAP

D. MS-CHAP

Answer: C

Q4. Which of the following practices should be followed to keep passwords secure? Each correct answer represents a complete solution. Choose three. 

A. Change the passwords whenever there is suspicion that they may have been compromised. 

B. A password should be alpha-numeric. 

C. A password should not be more than five words. 

D. Never write down a password. 

Answer: ABD 

Q5. Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to implement a method to ensure that the mobile devices are in a good state of security health when they are trying to access the corporate network. For this purpose, Mark is using NAP. Which of the following will he do for those computers in the network that are not compatible with NAP? 

A. Define exceptions in NAP for computers that are not compatible with NAP. 

B. Hide those computers that are not compatible with NAP. 

C. Remove those computers that are not compatible with NAP. 

D. Do not use the NAP, if any of the computers is showing incompatibility in the entire network. 

Answer:

Q6. The stronger password is a critical element in the security plan. Which of the following are the characteristics used to make up a strong password? 

A. It contains more than seven hundred characters and does not contain the user name, real name, or any name that can be guessed by the attacker easily. 

B. It contains more than seven characters and does not contain the user name, real name, or anyname that can be guessed by the attacker easily. 

C. It contains the user name, real name, or any name that can be remembered easily and does not contain more than seven characters. 

D. It contains more than seven characters and the user name, real name, or any name. 

Answer:

Q7. You work as a security manager for Company Inc. An individual is connecting to your corporate internal network over the Internet. You have to ensure that he is not an intruder masquerading as an authorized user. Which of the following technologies will you use to accomplish the task? 

A. Two-factor authentication 

B. IP address packet filtering 

C. Intrusion detection system (IDS) 

D. Embedded digital signature 

Answer:

Q8. Which of the following is a collection or list of user accounts or computer accounts? 

A. Group 

B. Active Directory 

C. Domain 

D. Public folder 

Answer:

Q9. What are the main classes of biometric characteristics? Each correct answer represents a complete solution. Choose two. 

A. Psychological

B. Behavioral 

C. Fundamental 

D. Physiological 

Answer: BD 

Q10. Which of the following is a Windows configuration option that enables administrators to restrict

communication among domain members only?

A. Demilitarized zone

B. Server isolation

C. Domain isolation

D. Domain kiting

Answer: