Download New Updated (June) Microsoft 98-367 Practice Test 71-80

EnsurepassQUESTION 71 HOTSPOT   Alice and Bob are exchanging messages with each other. Chuck modifies the messages sent between Alice and Bob as shown in the following image:     Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.           A.   B.   C.   D.     Answer:     QUESTION 72 A brute force attack:   A. Uses response Read more […]

Download New Updated (June) Microsoft 98-367 Practice Test 41-50

EnsurepassQUESTION 41 HOTSPOT   An employee where you work is unable to access the company message board in Internet Explorer.   You review her Internet Options dialog box, as shown in the following image:         Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.           A.   B.   C.   D.     Answer:     QUESTION Read more […]

Download New Updated (June) Microsoft 98-367 Practice Test 51-60

EnsurepassQUESTION 51 E-mail spoofing:   A. Forwards e-mail messages to all contacts B. Copies e-mail messages sent from a specific user C. Obscures the true e-mail sender D. Modifies e-mail routing logs   Answer: C Reference: http://www.microsoft.com/mscorp/safety/technologies/senderid/technology.mspx     QUESTION 52 What is the primary advantage of using Active Directory Integrated Zones?   A. Zone encryption B. Password protection C. Non-repudiation Read more […]

Download New Updated (June) Microsoft 98-367 Practice Test 61-70

EnsurepassQUESTION 61 Cookies impact security by enabling: (Choose two.)   A. Storage of Web site passwords. B. Higher security Web site protections. C. Secure Sockets Layer (SSL). D. Web sites to track browsing habits.   Answer: AD Reference: http://en.wikipedia.org/wiki/HTTP_cookie     QUESTION 62 You are trying to establish communications between a client computer and a server. The server is not responding.     You confirm that both the client and the Read more […]

Download New Updated (June) Microsoft 98-367 Practice Test 21-30

EnsurepassQUESTION 21 Which password attack uses all possible alpha numeric combinations?   A. Social engineering B. Brute force attack C. Dictionary attack D. Rainbow table attack   Answer: C     QUESTION 22 Basic security questions used to reset a password are susceptible to:   A. Hashing B. Social engineering C. Network sniffing D. Trojan horses   Answer: B Reference: http://en.wikipedia.org/wiki/Self-service_password_reset     Read more […]

Download New Updated (June) Microsoft 98-367 Practice Test 31-40

EnsurepassQUESTION 31 Which attack listens to network traffic of a computer resource?   A. Resource gathering B. Denial of service C. ARP poisoning D. Eavesdropping E. Logic bomb   Answer: D Explanation:Eavesdropping In general, the majority of network communications occur in an unsecured or “cleartext” format, which allows an attacker who has gained access to data paths in your network to “listen in” or interpret (read) the traffic. When an attacker is eavesdropping on Read more […]

Download New Updated (June) Microsoft 98-367 Practice Test 11-20

EnsurepassQUESTION 11 Humongous Insurance is an online healthcare insurance company. During an annual security audit a security firm tests the strength of the company’s password policy and suggests that Humongous Insurance implement password history policy.   What is the likely reason that the security firm suggests this?   A. Past passwords were easily cracked by the brute force method. B. Past passwords of users contained dictionary words. C. Previous password breaches involved Read more […]

Download New Updated (June) Microsoft 98-367 Practice Test 1-10

EnsurepassExam A   QUESTION 1 Which two are included in an enterprise antivirus program? (Choose two.)   A. Attack surface scanning B. On-demand scanning C. Packet scanning D. Scheduled scanning   Answer: BD     QUESTION 2 You are an intern at Litware, Inc. Your manager asks you to make password guess attempts harder by limiting login attempts on company computers.   What should you do?   A. Enforce password sniffing. B. Enforce password history. Read more […]