Free 98-367 Exam Dumps

Question 6

To implement WPA2 Enterprise, you would need a/an:

Correct Answer:A

Question 7

A group of users has access to Folder A and all of its contents. You need to prevent some of the users from accessing a subfolder inside Folder A.
What should you do first?

Correct Answer:A

Question 8

Your password is 1Vu*cI!8sT.
Which attack method is your password vulnerable to?

Correct Answer:A

Question 9

Which two characteristics should you recommend for a user's domain password? (Choose two.)

Correct Answer:AC
Reference: http://www.usewisdom.com/computer/passwords.html

Question 10

What are two attributes that an email message may contain that should cause a user to question whether the message is a phishing attempt? (Choose two.)

Correct Answer:BC
Reference: http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx