98-367 Dumps with Real 98-367 PDF Questions Answers 2018
Question: 1
One advantage of dynamic routing is that it:
A. Automatically maintains routing tables.
B. Limits traffic derived from routing protocols.
C. Reduces broadcast traffic.
D. Automatically enables DHCP.
Question: 1
Windows Firewall is a built-in. host-based, stateless firewall.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
A. Stateful
B.Network layer
C.Packet filter
D.No change is needed
Answer: A
Question: 2
Bridging is a process of sending packets from source to destination on OSI layer 3.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
A. Routing
B.Switching
C.Repeating
D.No change is needed.
Answer: A
Question: 3
The primary purpose of Network Access Protection (NAP) is to prevent:
A. Loss of data from client computers on a network.
B.Non-compliant systems from connecting to a network.
C.Users on a network from installing software.
D.Unauthorized users from accessing a network.
Answer: B
Question: 4
You want to make your computer resistant to online hackers and malicious software.
What should you do?
A. Configure a forward proxy.
B.Install anti-virus software.
C.Enable spam filtering.
D.Turn on Windows Firewall.
Answer: B
Question: 5
Your company requires that users type a series of characters to access the wireless network.
The series of characters must meet the following requirements:
Contains more than 15 characters
Contains at least one letter
Contains at least one number
Contains at least one symbol
Which security technology meets these requirements?
A. WEP
B.WPA2 PSK
C.WPA2 Enterprise
D.MAC filtering
Answer: B
Explanation: Pre-shared key mode (PSK, also known as Personal mode) is designed for home and small office networks that don't require the complexity of an 802.1X authentication server.[9] Each wireless network device encrypts the network traffic using a 256 bit key. This key may be entered either as a string of 64 hexadecimal digits, or as a passphrase of 8 to 63 printable ASCII characters
Question: 6
Many Internet sites that you visit require a user name and password.
How should you secure these passwords?
A. Save them to a text file
B.Enable session caching
C.Configure the browser to save passwords
D.Save them to an encrypted file
E.Reuse the same password
Answer: D
Question: 7
Physically securing servers prevents:
A. Theft
B.Compromise of the certificate chain
C.Man-in-the middle attacks
D.Denial of Service attacks
Answer: A
Certswarrior is a team of highly MTA Security Fundamentals qualified professionals spending numerous efforts in preparation of 98-367 exam material same like actual questions and answers to make it easy for candidates/professionals to go through their final exam. Our material of 98-367 will be PDF file which will download instantly once purchase is completed.