Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network uses Network Access Protection (NAP). The company's employees at the remote locations are connecting to the company's network from their Windows Vista clients. Mark wants to ensure that the data transmission between a client computer and the company's network is as secure as possible. What will Mark do to accomplish the task?
A. Use Encrypting File System (Efs) between the client computer and the company's network.
B. Use IPSec NAP policy between client computer and the company's network.
C. Use VPN connection with MS-CHAP v2 between the client computer and the company's network.
D. Use NAP enforcement for DHCP.
Which of the following are the main features of a key logger? Each correct answer represents a complete solution. Choose all that apply.
A. It can be delivered via FTP or e-mail.
B. It can record all keystrokes.
C. It can capture all screenshots.
D. It can detect viruses on the computer.
Which of the following is an authentication protocol?
A. Kerberos
B. LDAP
C. TLS
D. PPTP
Which of the following is a broadcast domain created by a switch?
A. VLAN
B. MAN
C. DMZ
D. VPN
Which of the following is a attack type that is used to poison a network or computer to the point where the system is turned into unusable state?
A. Mail bombing
B. Pharming
C. Protocol spoofing
D. Denial of service (DOS)
Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?
A. Static NAT
B. Port Address Translation (PAT)
C. Dynamic NAT
D. Cache NAT
Which of the following viruses cannot be detected by the signature-based antivirus?
A. Polymorphic
B. MBR virus
C. Boot sector
D. Macro
Which of the following can be implemented to decrease the number of times a user is required to be authenticated for access a particular resource?
A. TCP/IP protocol
B. Network Directory Access Protocol
C. Kerberos
D. Single Sign-on (SSO)
You are responsible for virus protection for a large college campus. You are very concerned that your antivirus solution must be able to capture the latest virus threats. What sort of virus protection should you implement?
A. Network Based
B. Host based
C. Dictionary
D. Heuristic
Which of the following applications captures network packets as they traverse a network and displays them to the attacker?
A. Keylogger
B. Sniffer
C. Key fob
D. Protocol analyzer
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 98-367 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.