[Free] 2018(Mar) Dumps4cert Testking Microsoft 98-367 Dumps with VCE and PDF 41-50

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Mar Microsoft Official New Released 98-367
100% Free Download! 100% Pass Guaranteed!

Security fundamentals

Question No: 41

Coho Winery wants to increase their web presence and hires you to set up a new web server. Coho already has servers for their business and would like to avoid purchasing a new one.

Which server is best to use as a web server, considering the security and performance concerns?

  1. SQL Server

  2. File Server

  3. Domain Controller

  4. Application Server

Answer: C

Question No: 42 HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

Dumps4Cert 2018 PDF and VCE


Dumps4Cert 2018 PDF and VCE


Dumps4Cert 2018 PDF and VCE


Question No: 43

What is the standard or basic collection of NTFS permissions?

  1. Read and execute, read, write, full control, modify, list folder contents

  2. Change permissions, read permissions, write permissions

  3. Read attributes, list folder/read data, traverse folder/execute file

  4. Create files/write data, create folders/append data, take ownership

Answer: A

Reference: http://technet.microsoft.com/en-us/library/bb727008.aspx

Question No: 44

A group of users has access to Folder A and all of its contents. You need to prevent some of the users from accessing a subfolder inside Folder A.

What should you do first?

  1. Disable folder sharing

  2. Hide the folder

  3. Change the owner

  4. Block inheritance

Answer: A

Question No: 45

You need to install a domain controller in a branch office. You also need to secure the information on the domain controller. You will be unable to physically secure the server.

Which should you implement?

  1. Read-Only Domain Controller

  2. Point-to-Point Tunneling Protocol (PPTP)

  3. Layer 2 Tunneling Protocol (L2TP)

  4. Server Core Domain Controller

Answer: A Explanation:

A read-only domain controller (RODC) is a new type of domain controller in the Windows Server庐 2008 operating system. With an RODC, organizations can easily deploy a domain controller in locations where physical security cannot be guaranteed. An RODC hosts read- only partitions of the Active Directory庐 Domain Services (AD DS) database. http://technet.microsoft.com/en-us/library/cc732801(v=ws.10).aspx

Question No: 46

Physically securing servers prevents:

  1. Theft

  2. Compromise of the certificate chain

  3. Man-in-the middle attacks

  4. Denial of Service attacks

Answer: A

Question No: 47

Phishing is an attempt to:

  1. Obtain information by posing as a trustworthy entity.

  2. Limit access to e-mail systems by authorized users.

  3. Steal data through the use of network intrusion.

  4. Corrupt e-mail databases through the use of viruses.

Answer: A Explanation:

Phishing is the act of attempting to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.

Question No: 48

You are setting up Remote Desktop on your computer. Your computer is a member of a domain.

Your firewall configuration is shown in the following image:

Dumps4Cert 2018 PDF and VCE

You need to allow Remote Desktop to be able to get through your firewall for users on your company#39;s network.

Which settings should you enable?

  1. Remote Assistance: Home/Work (Private)

  2. Remote Desktop: Public

  3. Remote Desktop: Home/Work (Private)

  4. Remote Assistance: Domain

Answer: A

Question No: 49 HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

Dumps4Cert 2018 PDF and VCE


Dumps4Cert 2018 PDF and VCE

Dumps4Cert 2018 PDF and VCE



Question No: 50

You are an intern and are working remotely.

You need a solution that meets the following requirements:

->Allows you to access data on the company network securely

->Gives you the same privileges and access as if you were in the office

What are two connection methods you could use? (Choose two.)

  1. Forward Proxy

  2. Virtual Private Network (VPN)

  3. Remote Access Service (RAS)

  4. Roaming Profiles

Answer: B,D

100% Dumps4cert Free Download!
Download Free Demo:98-367 Demo PDF
100% Dumps4cert Free Guaranteed!
98-367 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.