Tuesday, December 22, 2020

Get 98-367 PDF Dumps for Simple Good results: Realexamdumps.com


 Question: 1


Windows Firewall is a built-in. host-based, stateless firewall.

Select the correct answer if the underlined text does not make the statement correct. Select "No change

is needed" if the underlined text makes the statement correct.


A. Stateful

B.Network layer

C.Packet filter

D.No change is needed


Answer: A


Question: 2


Bridging is a process of sending packets from source to destination on OSI layer 3.

Select the correct answer if the underlined text does not make the statement correct. Select "No change

is needed" if the underlined text makes the statement correct.


A. Routing

B.Switching

C.Repeating

D.No change is needed.


Answer: A


Question: 3


The primary purpose of Network Access Protection (NAP) is to prevent:


A. Loss of data from client computers on a network.

B.Non-compliant systems from connecting to a network.

C.Users on a network from installing software.

D.Unauthorized users from accessing a network.


Answer: B


Explanation:


NAP enforces health policies by inspecting and assessing the health of client computers, restricting

network access when client computers are noncompliant with health policy, and remediating

noncompliant client computers to bring them into compliance with health policy before they are

granted full network access. NAP enforces health policies on client computers that are attempting to

connect to a network; NAP also provides ongoing health compliance enforcement while a client

computer is connected to a network.


Explanation:


Reference:

http://technet.microsoft.com/en-us/library/cc754378(v=ws.10).aspx


Question: 4


You want to make your computer resistant to online hackers and malicious software.

What should you do?


A. Configure a forward proxy.

B.Install anti-virus software.

C.Enable spam filtering.

D.Turn on Windows Firewall.


Answer: B 


Question: 5


Your company requires that users type a series of characters to access the wireless network.

The series of characters must meet the following requirements:

Contains more than 15 characters

Contains at least one letter

Contains at least one number

Contains at least one symbol

Which security technology meets these requirements?


A. WEP

B.WPA2 PSK

C.WPA2 Enterprise

D.MAC filtering


Answer: B 


No comments:

Post a Comment