Email spoofing:
A. obscures the true email sender
B. copies email messages sent from a specific user
C. modifies email routing logs
D. forwards email messages to all contacts
The reason for implementing Service Set IDentifier (SSID) masking is to:
A. enforce a more secure password policy
B. hide a wireless network name from unknown computers
C. hide a network share from unauthorized users
D. disable autologon
The name of a particular wireless LAN that is broadcast on a network is referred to as a:
A. MAC address
B. Basis Service Set (BSS)
C. Wireless Access Point (WAP)
D. Service Set Identifier (SSID)
You manage 50 Windows workstations in a computer lab. All workstations belong to the lab Active Directory domain.
You need to implement several audit policies on each workstation in the shortest time possible.
What should you do?
A. Enable logging on each computer
B. Create a domain Group Policy
C. Turn on the Audit Policy on the domain controller
D. Enable Audit object access
What displays a user's level of access to a particular file or folder on the server?
A. The Resultant Set of Policy
B. the object's Advanced Attributes
C. the object's Effective Permissions
D. the client computer's registry
Kerberos prevents:
A. Denial of Service attacks
B. spyware distribution
C. file corruption
D. replay attacks
You have a Windows 2012 R2 Server. Security logging is enabled. You use this log for several audits of the server.
You need to make sure the log is not overwritten when it reaches its maximum log size.
What should you do?
A. Copy logs regularly to a different location
B. Maintain a backup of the log file
C. Increase the log file size
D. Enable archiving
What are three examples of factors required for multi-factor authentication? (Choose three.)
A. a username
B. a smart card
C. a fingerprint
D. a password challenge question
E. a pin number
Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to implement stronger authentication measures for the customers, as well as eliminate IT staff from logging on with high privileges. Mark has various options, but he is required to keep the processes easy for the helpdesk staff. Which of the following is a service can the staff uses as an alternative of signing in with elevate privileges?
A. Secondary Logon-Run As
B. Security log
C. Hardware firewall
D. Encrypted network configuration
Which of the following operating systems have Windows Security Health Agent (SHA) on computers and report their status to the Security Health Validator (SHV)? Each correct answer represents a complete solution. Choose three.
A. Windows 2000 Professional
B. Windows Vista Business
C. Windows XP Service Pack 3
D. Windows 7 Professional
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 98-367 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.