It is impossible to pass Microsoft 98-367 exam without any help in the short term. Come to Testking soon and find the most advanced, correct and guaranteed Microsoft 98-367 practice questions. You will get a surprising result by our Leading MTA Security Fundamentals Practice Test practice guides.
Q71. Which of the following operating systems have Windows Security Health Agent (SHA) on computers and report their status to the Security Health Validator (SHV)? Each correct answer represents a complete solution. Choose three.
A. Windows 2000 Professional
B. Windows Vista Business
C. Windows XP Service Pack 3
D. Windows 7 Professional
Answer: BCD
Q72. Which of the following is the edge between the private and locally managed-and-owned side of a network and the public side that is commonly managed by a service provider?
A. Internet
B. Network perimeter
C. Intranet
D. VLAN
Answer: B
Q73. Which of the following root keys stores information about registered applications?
A. HKEY_USERS
B. HKEY_CLASSES_ROOT
C. HKEY_CURRENT_CONFIG
D. HKEY_CURRENT_USER
Answer: B
Q74. Which of the following MMC snap-in consoles is used to administer domain and forest functional levels and user principal name (UPN) suffixes?
A. Group Policy Management Console
B. Active Directory Domains and Trusts
C. Active Directory Sites and Services
D. Active Directory Administrative Center
Answer: B
Q75. Which of the following is an organization that defines standards for anti-virus software?
A. ICSA
B. IETF
C. IIS
D. IEEE
Answer: A
Q76. Which of the following are the major components of the IPsec protocol? Each correct answer represents a complete solution. Choose all that apply.
A. Encapsulating Security Payload (ESP)
B. Authentication Header (AH)
C. Internet Encryption Key (IEK)
D. Internet Key Exchange (IKE)
Answer: ABD
Q77. Which of the following areas of a network contains DNS servers and Web servers for Internet users?
A. VPN
B. MMZ
C. DMZ
D. VLAN
Answer: C
Q78. Which of the following is the result of setting the value of Enforce Password History to 10?
A. The system will remember the last 10 passwords and will not permit the user to reuse any of those passwords.
B. The user is granted with a permission of 10 attempts to validate the password
C. The password can be changed only after 10 days of its creation.
D. The system will automatically generate the new 10 passwords that can be used by the user.
Answer: A
Q79. Which of the following points has to be considered for using the BitLocker?
A. The deployment of antivirus because BitLocker needs a a removal of buffer overflow.
B. The deployment of SEAL because BitLocker needs an alternative encryption algorithm to software-based DES, 3DES, and AES. .
C. The deployment of hardware because BitLocker needs a system reserved partition.
D. The deployment of hard disk because BitLocker needs a bot.
Answer: C
Q80. Which of the following is the most common method for an attacker to spoof email?
A. Back door
B. Replay attack
C. Man-in-the-middle attack
D. Open relay
Answer: D