Download New Updated (June) Microsoft 98-367 Practice Test 21-30

Ensurepass

QUESTION 21

Which password attack uses all possible alpha numeric combinations?

 

A.

Social engineering

B.

Brute force attack

C.

Dictionary attack

D.

Rainbow table attack

 

Answer: C

 

 

QUESTION 22

Basic security questions used to reset a password are susceptible to:

 

A.

Hashing

B.

Social engineering

C.

Network sniffing

D.

Trojan horses

 

Answer: B

Reference: http://en.wikipedia.org/wiki/Self-service_password_reset

 

 

QUESTION 23

The certificate of a secure public Web server on the Internet should be:

 

A.

Issued by a public certificate authority (CA)

B.

Signed by using a 4096-bit key

C.

Signed by using a 1024-bit key

D.

Issued by an enterprise certificate authority (CA)

 

Answer: A

 

 

QUESTION 24

HOTSPOT

 

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

 

 

 

clip_image002

 

A.

 

B.

 

C.

 

D.

 

 

Answer:

 

 

QUESTION 25

The purpose of User Account Control (UAC) is to:

 

A.

Encrypt the user’s account

B.

Limit the privileges of software

C.

Secure your data from corruption

D.

Facilitate Internet filtering

 

Answer: B

Explanation:User Account Control (UAC) is a technology and security infrastructure introduced with Microsoft’s Windows machines. It aims to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator authorizes an increase or elevation. In this way, only applications trusted by the user may receive administrative privileges, and malware should be kept from compromising the operating

 

 

 

system.

 

 

QUESTION 26

Creating MD5 hash for files is an example of ensuring what?

 

A.

Confidentiality

B.

Availability

C.

Least privilege

D.

Integrity

 

Answer: D

Explanation:The MD5 message-digest algorithm is a widely used cryptographic hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. MD5 has been utilized in a wide variety of cryptographic applications, and is also commonly used to verify data integrity.

 

 

QUESTION 27

This question requires that you evaluate the underlined text to determine if it is correct.

 

The first line of defense against attacks from the Internet is a software firewall.

 

Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.

 

A.

hardware firewall

B.

virus software

C.

radius server

D.

No change is needed

 

Answer: A

 

 

QUESTION 28

HOTSPOT

 

You are preparing an audit policy for the workstations at Contoso, Ltd. Currently, no advanced auditing is enabled. Th
e workstations are not members of the domain.

 

The settings of your Advanced Audit Policy Configuration are shown in the following image:

 

clip_image004

 

Use the drop-down menus to select the answer choice that completes each statement.

Each correct selection is worth one point.

 

clip_image006

 

 

 

clip_image008

 

A.

 

B.

 

C.

 

D.

 

 

Answer:

 

 

QUESTION 29

HOTSPOT

 

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

 

clip_image010

 

A.

 

B.

 

C.

 

D.

 

 

Answer:

 

 

QUESTION 30

You are an intern at Wide World Importers and help manage 1000 workstations. All the workstations are members of an Active Domain.

 

You need to push out an internal certificate to Internet Explorer on all workstations.

 

What is the quickest method to do this?

 

A.

Local policy

B.

Logon script

C.

Windows Update

D.

Group policy

 

Answer: A

 

Free VCE & PDF File for Microsoft 98-367 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…