Microsoft 98-367 & 98-368 Certification Practical Exam Set 2

You need to install a domain controller in a branch office. You also need to secure the information on the domain controller. You will be unable to physically secure the server. Which should you implement?


Options are :

  • Server Core Domain Controller
  • Point-to-Point Tunneling Protocol (PPTP)
  • Read-Only Domain Controller
  • Layer 2 Tunneling Protocol (L2TP)

Answer : Read-Only Domain Controller

What is a service set identifier (SSID)?


Options are :

  • The broadcast name of an access point
  • The wireless LAN transmission type
  • A wireless encryption standard
  • A wireless security protocol

Answer : The broadcast name of an access point

70-646 Pro Windows Server 2008 - Server Administrator Exam Set 5

To implement WPA2 Enterprise, you would need a/an:


Options are :

  • RADIUS server
  • VPN server
  • WEP server
  • SSL server

Answer : RADIUS server

What are two attributes that an email message may contain that should cause a user to question whether the message is a phishing attempt? (Choose two.)


Options are :

  • Threats of losing service
  • An image contained in the message
  • B,C
  • Use of bold and italics
  • Spelling and grammar errors

Answer : B,C

A group of users has access to Folder A and all of its contents. You need to prevent some of the users from accessing a subfolder inside Folder A. What should you do first?


Options are :

  • Hide the folder
  • Disable folder sharing
  • Change the owner
  • Block inheritance

Answer : Disable folder sharing

Microsoft 70-647 Windows Enterprise Administrator Exam Set 9

To protect systems from buffer overflow errors, you can use:


Options are :

  • A proxy server
  • Antivirus software
  • Data Execution Prevention
  • An Intruder Prevention System

Answer : Data Execution Prevention

The Graphic Design Institute hires you to help them set up a server for their 20-person team. As a general practice of hardening the server, you start by performing which two tasks? (Choose two.)


Options are :

  • Remove the account lockout policy.
  • Disable the guest account.
  • A,B
  • Format partitions with FAT32.
  • Rename the admin account.

Answer : A,B

A user who receives a large number of emails selling prescription medicine is probably receiving pharming mail. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.


Options are :

  • No change is needed.
  • Spoofed mail
  • Malware
  • Spam

Answer : Spam

Microsoft Dynamics Expand and Test Your Skills Practice Test Set 2

The WPA2 PreShared Key (PSK) is created by using a passphrase (password) and salting it with the WPS PIN. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.


Options are :

  • WEP key
  • Admin password
  • Service Set Identifier (SSID)
  • No change is needed

Answer : Service Set Identifier (SSID)

Cookies impact security by enabling: (Choose two.)


Options are :

  • A,D
  • Secure Sockets Layer (SSL).
  • Web sites to track browsing habits.
  • Higher security Web site protections.
  • Storage of Web site passwords.

Answer : A,D

You are volunteering at an organization that gets a brand new web server. To make the server more secure, you should add a second administrator account. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.


Options are :

  • No change is needed.
  • Enable LM authentication
  • Disable unused services
  • Enable NTLM authentication

Answer : Disable unused services

70-680 Windows 7 Configuring Certification Practice Exam Set 4

What does NAT do?


Options are :

  • It translates public IP addresses to private addresses and vice versa.
  • It analyzes incoming and outgoing traffic packets.
  • It provides caching and reduces network traffic.
  • It encrypts and authenticates IP packets.

Answer : It translates public IP addresses to private addresses and vice versa.

The Active Directory controls, enforces, and assigns security policies and access rights for all users. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.


Options are :

  • No change is needed
  • User Account Control
  • Registry
  • NTFS permissions

Answer : No change is needed

Which attack listens to network traffic of a computer resource?


Options are :

  • Eavesdropping
  • Logic bomb
  • ARP poisoning
  • Resource gathering
  • Denial of service

Answer : Eavesdropping

70-647 Pro Windows Server 2008 Enterprise Administrator Exam Set 1

Your company requires that users type a series of characters to access the wireless network. The series of characters must meet the following requirements: ? Contains more than 15 characters ? Contains at least one letter ? Contains at least one number ? Contains at least one symbol Which security technology meets these requirements?


Options are :

  • MAC filtering
  • WEP
  • WPA2 Enterprise
  • WPA2 PSK

Answer : WPA2 PSK

You have two servers that run Windows Server. All drives on both servers are formatted by using NTFS. You move a file from one server to the other server. The file's permissions in the new location will:


Options are :

  • Enable full access to the everyone group
  • Retain the original folder's permissions
  • Restrict access to the Administrators group
  • Inherit the destination folder's permissions

Answer : Inherit the destination folder's permissions

Microsoft 70-642 Windows Server Network Infrastructure Exam Set 3

When conducting a security audit the first step is to:


Options are :

  • Set up a virus quarantine area
  • Install auditing software on your servers
  • Inventory the company's technology assets
  • Set up the system logs to audit security events

Answer : Inventory the company's technology assets

Network Access Protection (NAP) enables administrators to control access to network resources based on a computer's:


Options are :

  • Physical location
  • Configuration
  • Encryption level
  • Warranty

Answer : Configuration

The company that you work for wants to set up a secure network, but they do not have any servers. Which three security methods require the use of a server? (Choose three.)


Options are :

  • RADIUS
  • WPA2 Enterprise
  • WPA2 Personal
  • 802.1x
  • 802.11ac
  • A,C,D

Answer : A,C,D

Microsoft 70-647 Windows Enterprise Administrator Exam Set 6

You create a new file in a folder that has inheritance enabled. By default, the new file:


Options are :

  • Takes the permissions of other folders in the same directory
  • Does not take any permissions
  • Takes the permissions of the parent folder
  • Takes the permissions of other files in the same directory

Answer : Takes the permissions of the parent folder

Which two are included in an enterprise antivirus program? (Choose two.)


Options are :

  • Attack surface scanning
  • B,D
  • Scheduled scanning
  • On-demand scanning
  • Packet scanning

Answer : B,D

Which three elements does HTTPS encrypt? (Choose three.)


Options are :

  • A,D,E
  • Website URL
  • Browser cookies
  • Login information
  • Server IP address
  • Port numbers

Answer : A,D,E

70-646 Pro Windows Server 2008 - Server Administrator Exam Set 1

Basic security questions used to reset a password are susceptible to:


Options are :

  • Trojan horses
  • Network sniffing
  • Hashing
  • Social engineering

Answer : Social engineering

E-mail bombing attacks a specific entity by:


Options are :

  • Tracing e-mail to the destination address
  • Sending high volumes of e-mail
  • Redirecting all e-mail to another entity
  • Triggering high levels of security alerts

Answer : Sending high volumes of e-mail

Which type of firewall allows for inspection of all characteristics of a packet?


Options are :

  • Stateful
  • NAT
  • Stateless
  • Windows Defender

Answer : Stateful

Microsoft 70-647 Windows Enterprise Administrator Exam Set 5

You suspect a user's computer is infected by a virus. What should you do first?


Options are :

  • Disconnect the computer from the network
  • Install antivirus software on the computer
  • Replace the computer's hard disk drive
  • Restart the computer in safe mode

Answer : Install antivirus software on the computer

The purpose of a digital certificate is to verify that a:


Options are :

  • Public key belongs to a sender.
  • Digital document is complete.
  • Computer is virus-free.
  • Private key belongs to a sender.

Answer : Public key belongs to a sender.

Which technology enables you to filter communications between a program and the Internet?


Options are :

  • Antivirus software
  • RADIUS server
  • BitLocker To Go
  • Software firewall

Answer : Software firewall

70-662 Microsoft Exchange Server 2010 Configuring Exam Set 3

Dumpster diving refers to a physical threat that a hacker might use to look for information about a computer network. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.


Options are :

  • Reverse Social engineering
  • Phishing
  • Malware
  • No change is needed

Answer : No change is needed

You need to prevent unauthorized users from reading a specific file on a portable computer if the portable computer is stolen. What should you implement?


Options are :

  • Folder-level permissions
  • File-level permissions
  • BitLocker
  • Distributed File System (DFS)
  • Advanced Encryption Standard (AES)

Answer : BitLocker

Password history policies are used to prevent:


Options are :

  • Users from sharing passwords
  • Brute force attacks
  • Social engineering
  • Passwords from being reused immediately

Answer : Passwords from being reused immediately

The manager of a coffee shop hires you to securely set up WiFi in the shop. To keep computer users from seeing each other, what should you use with an access point?


Options are :

  • Client bridge mode
  • Client isolation mode
  • MAC address filtering
  • Client mode

Answer : Client isolation mode

The Windows Firewall protects computers from unauthorized network connections. Select the correct answer if the underlined text does not make the statement correct. Select "No change is need