The certificate of a secure public Web server on the Internet should be:
A. Issued by a public certificate authority (CA)
B. Signed by using a 4096-bit key
C. Signed by using a 1024-bit key
D. Issued by an enterprise certificate authority (CA)
You need to grant a set of users write access to a file on a network share. You should add the users to:
A. A security group
B. The Authenticated Users group
C. The Everyone group
D. A distribution group
You are an intern at Litware, Inc. Your manager asks you to make password guess attempts harder by limiting login attempts on company computers. What should you do?
A. Enforce password sniffing.
B. Enforce password history.
C. Make password complexity requirements higher.
D. Implement account lockout policy.
When conducting a security audit the first step is to: A. Inventory the company's technology assets
B. Install auditing software on your servers
C. Set up the system logs to audit security events
D. Set up a virus quarantine area
Which is a special folder permission?
A. Read
B. Modify
C. Write
D. Delete
Where should you lock up the backup tapes for your servers?
A. The server room
B. A filing cabinet
C. The tape library
D. An offsite fire safe
Humongous Insurance needs to set up a domain controller in a branch office. Unfortunately, the server cannot be sufficiently secured from access by employees in that office, so the company is installing a Primary Domain Controller. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
A. Read-Only Domain Controller
B. Backup Domain Controller
C. Active Directory Server
D. No change is needed.
Which two are included in an enterprise antivirus program? (Choose two.)
A. Attack surface scanning
B. On-demand scanning
C. Packet scanning
D. Scheduled scanning
Phishing is an attempt to:
A. Obtain information by posing as a trustworthy entity.
B. Limit access to e-mail systems by authorized users.
C. Steal data through the use of network intrusion.
D. Corrupt e-mail databases through the use of viruses.
What is the primary advantage of using Active Directory Integrated Zones?
A. Zone encryption
B. Password protection
C. Non-repudiation
D. Secure replication
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 98-367 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.