To protect systems from buffer overflow errors, you can use:
A. Antivirus software
B. Data Execution Prevention
C. A proxy server
D. An Intruder Prevention System
Which two characteristics should you recommend for a user's domain password? (Choose two.)
A. Hard to guess
B. Includes Unicode characters
C. Easy to remember
D. Easy to increment
Windows Server Update Services (WSUS) is a tool that:
A. Updates data stored in Windows servers
B. Manages the services that run on a server
C. Updates licensing for Windows servers
D. Manages updates for Microsoft software
How does the sender policy framework (SPF) aim to reduce spoofed email?
A. It provides a list of IP address ranges for particular domains so senders can be verified.
B. It includes an XML policy file with each email that confirms the validity of the message.
C. It lists servers that may legitimately forward mail for a particular domain.
D. It provides an encryption key so that authenticity of an email message can be validated
E-mail bombing attacks a specific entity by:
A. Redirecting all e-mail to another entity
B. Sending high volumes of e-mail
C. Tracing e-mail to the destination address
D. Triggering high levels of security alerts
The manager of a coffee shop hires you to securely set up WiFi in the shop.
To keep computer users from seeing each other, what should you use with an access point?
A. Client bridge mode
B. Client isolation mode
C. MAC address filtering
D. Client mode
You would implement a wireless intrusion prevention system to:
A. Prevent wireless interference
B. Detect wireless packet theft
C. Prevent rogue wireless access points
D. Enforce SSID broadcasting
To implement WPA2 Enterprise, you would need a/an:
A. RADIUS server
B. SSL server
C. WEP server
D. VPN server
What is a service set identifier (SSID)?
A. A wireless encryption standard
B. The wireless LAN transmission type
C. The broadcast name of an access point
D. A wireless security protocol
A network sniffer is software or hardware that:
A. Records user activity and transmits it to the server
B. Captures and analyzes network communication
C. Protects workstations from intrusions
D. Catalogs network data to create a secure index
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 98-367 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.