Microsoft 98-367 & 98-368 Certification Practical Exam Set 1

The company that you work for wants to set up a secure network, but they do not have any servers. Which three security methods require the use of a server? (Choose three.)


Options are :

  • 802.1x
  • WPA2 Enterprise
  • A,C,D
  • RADIUS
  • 802.11ac
  • WPA2 Personal

Answer : A,C,D

Microsoft Certified Solutions Developer (MCSD) For 2019 Set 1

Which technology enables you to filter communications between a program and the Internet?


Options are :

  • BitLocker To Go
  • RADIUS server
  • Software firewall
  • Antivirus software

Answer : Software firewall

You create a new file in a folder that has inheritance enabled. By default, the new file:


Options are :

  • Takes the permissions of other files in the same directory
  • Does not take any permissions
  • Takes the permissions of other folders in the same directory
  • Takes the permissions of the parent folder

Answer : Takes the permissions of the parent folder

The Windows Firewall protects computers from unauthorized network connections. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.


Options are :

  • Phishing scams
  • Unencrypted network access
  • Email viruses
  • No change is needed

Answer : No change is needed

Microsoft 70-642 Windows Server Network Infrastructure Exam Set 7

Before you deploy Network Access Protection (NAP), you must install:


Options are :

  • Network Policy Server (NPS)
  • Internet Information Server (IIS)
  • Windows Update Service
  • Active Directory Federation Services

Answer : Network Policy Server (NPS)

Network Access Protection (NAP) enables administrators to control access to network resources based on a computer's:


Options are :

  • Configuration
  • Warranty
  • Encryption level
  • Physical location

Answer : Configuration

Password history policies are used to prevent:


Options are :

  • Users from sharing passwords
  • Brute force attacks
  • Passwords from being reused immediately
  • Social engineering

Answer : Passwords from being reused immediately

Microsoft 70-642 Windows Server Network Infrastructure Exam Set 1

The purpose of a digital certificate is to verify that a:


Options are :

  • Computer is virus-free.
  • Private key belongs to a sender.
  • Public key belongs to a sender.
  • Digital document is complete.

Answer : Public key belongs to a sender.

This question requires that you evaluate the underlined text to determine if it is correct. The first line of defense against attacks from the Internet is a software firewall. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.


Options are :

  • virus software
  • hardware firewall
  • radius server
  • No change is needed

Answer : hardware firewall

Which type of firewall allows for inspection of all characteristics of a packet?


Options are :

  • Windows Defender
  • NAT
  • Stateful
  • Stateless

Answer : Stateful

Microsoft 70-647 Windows Enterprise Administrator Exam Set 8

You need to prevent unauthorized users from reading a specific file on a portable computer if the portable computer is stolen. What should you implement?


Options are :

  • File-level permissions
  • Folder-level permissions
  • Distributed File System (DFS)
  • BitLocker
  • Advanced Encryption Standard (AES)

Answer : BitLocker

You suspect a user's computer is infected by a virus. What should you do first?


Options are :

  • Replace the computer's hard disk drive
  • Disconnect the computer from the network
  • Install antivirus software on the computer
  • Restart the computer in safe mode

Answer : Install antivirus software on the computer

Your company requires that users type a series of characters to access the wireless network. The series of characters must meet the following requirements: ? Contains more than 15 characters ? Contains at least one letter ? Contains at least one number ? Contains at least one symbol Which security technology meets these requirements?


Options are :

  • WPA2 Enterprise
  • WEP
  • WPA2 PSK
  • MAC filtering

Answer : WPA2 PSK

PIC Microcontroller Test Your Skills and Get Certified Set 1

Which two are included in an enterprise antivirus program? (Choose two.)


Options are :

  • Packet scanning
  • Attack surface scanning
  • B,D
  • On-demand scanning
  • Scheduled scanning

Answer : B,D

Setting a minimum password age restricts when users can:


Options are :

  • Set their own password expiration
  • Log on by using their passwords
  • Request a password reset
  • Change their passwords

Answer : Change their passwords

Which three elements does HTTPS encrypt? (Choose three.)


Options are :

  • Browser cookies
  • Website URL
  • Server IP address
  • Login information
  • A,D,E
  • Port numbers

Answer : A,D,E

70-513 WCF Development with Microsoft .NET Framework 4 Exam Set 5

E-mail bombing attacks a specific entity by:


Options are :

  • Triggering high levels of security alerts
  • Tracing e-mail to the destination address
  • Sending high volumes of e-mail
  • Redirecting all e-mail to another entity

Answer : Sending high volumes of e-mail

Dumpster diving refers to a physical threat that a hacker might use to look for information about a computer network. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.


Options are :

  • Phishing
  • Malware
  • No change is needed
  • Reverse Social engineering

Answer : No change is needed

Which is a special folder permission?


Options are :

  • Write
  • Read
  • Modify
  • Delete

Answer : Delete

Microsoft 98-367 & 98-368 Certification Practical Exam Set 1

When conducting a security audit the first step is to:


Options are :

  • Inventory the company's technology assets
  • Install auditing software on your servers
  • Set up the system logs to audit security events
  • Set up a virus quarantine area

Answer : Inventory the company's technology assets

What are three major attack vectors that a social engineering hacker may use? (Choose three.)


Options are :

  • Waste management
  • Telephone
  • Firewall interface
  • Honey pot systems
  • A,B,C
  • Reverse social engineering

Answer : A,B,C

You have two servers that run Windows Server. All drives on both servers are formatted by using NTFS. You move a file from one server to the other server. The file's permissions in the new location will:


Options are :

  • Enable full access to the everyone group
  • Restrict access to the Administrators group
  • Inherit the destination folder's permissions
  • Retain the original folder's permissions

Answer : Inherit the destination folder's permissions

Microsoft 70-642 Windows Server Network Infrastructure Exam Set 1

You need to grant a set of users write access to a file on a network share. You should add the users to:


Options are :

  • A distribution group
  • The Authenticated Users group
  • The Everyone group
  • A security group

Answer : The Authenticated Users group

Basic security questions used to reset a password are susceptible to:


Options are :

  • Network sniffing
  • Hashing
  • Trojan horses
  • Social engineering

Answer : Social engineering

The manager of a coffee shop hires you to securely set up WiFi in the shop. To keep computer users from seeing each other, what should you use with an access point?


Options are :

  • Client mode
  • Client bridge mode
  • Client isolation mode
  • MAC address filtering

Answer : Client isolation mode

70-513 WCF Development with Microsoft .NET Framework 4 Exam Set 5

Setting a minimum password age restricts when users can:


Options are :

  • Request a password reset
  • Set their own password expiration
  • Log on by using their passwords
  • Change their passwords

Answer : Change their passwords

70-647 Pro Windows Server 2008 Enterprise Administrator Exam Set 5

You need to grant a set of users write access to a file on a network share. You should add the users to:


Options are :

  • The Authenticated Users group
  • A distribution group
  • A security group
  • The Everyone group

Answer : The Authenticated Users group

Which is a special folder permission?


Options are :

  • Delete
  • Modify
  • Write
  • Read

Answer : Delete

Before you deploy Network Access Protection (NAP), you must install:


Options are :

  • Network Policy Server (NPS)
  • Windows Update Service
  • Internet Information Server (IIS)
  • Active Directory Federation Services

Answer : Network Policy Server (NPS)

70-646 Pro Windows Server 2008 - Server Administrator Exam Set 5

What are three major attack vectors that a social engineering hacker may use? (Choose three.)


Options are :

  • Telephone
  • Honey pot systems
  • Firewall interface
  • Waste management
  • Reverse social engineering
  • A,B,C

Answer : A,B,C

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions