98-367 Exam - MTA Security Fundamentals Practice Test

certleader.com

Q1. Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network. The company is adding an open, high-speed, wireless access for their customers and secured wireless for employees at all 37 branches. He wants to check the various security concerns for ensuring that business traffic is secured. He is also under pressure to make this new feature a winning strategy for a company. 

In which of the following ways can Mark add another level of security after implanting encryption techniques for the business wireless traffic? Each correct answer represents a complete solution. Choose all that apply. 

A. Hide the Service Set Identifier (SSID) 

B. Configure the network to use only Extensible Authentication Protocol (EAP) 

C. Implement access point isolation and 

D. Use MAC filtering 

Answer: AC 

Q2. Which of the following states that a user should never be given more privileges than are required to

carry out a task?

A. Security through obscurity

B. Segregation of duties

C. Principle of least privilege

D. Role-based security

Answer:

Q3. Which of the following is the process used by attackers for listening to the network traffic? 

A. Eavesdropping 

B. Subnetting 

C. Sanitization 

D. Hacking 

Answer:

Q4. Which of the following is a mechanism that allows authentication of dial-in and other network connections? 

A. VPN 

B. NTFS 

C. RADIUS 

D. Single Sign-On 

Answer:

Q5. Which of the following is an organization that defines standards for anti-virus software? 

A. ICSA

B. IETF 

C. IIS 

D. IEEE 

Answer:

Q6. Which of the following steps can be taken by an administrator as countermeasures against software keyloggers? Each correct answer represents a part of the solution. Choose all that apply. 

A. Use commercially available anti-keyloggers. 

B. Actively monitor the programs running on the server. 

C. Update antivirus regularly. 

D. Always check hard disk space on the server. 

Answer: ABC 

Q7. Which of following is required to be configured to ensure that the Bitlocker storage can be reclaimed? 

A. BitLocker to use data recovery agents 

B. BitLocker to use the password screen saver 

C. BitLocker to use the Secret Retrieval Agent 

D. BitLocker to use the Artificial Intelligence recovery option. 

Answer:

Q8. Mark works as a Network Administrator fot Blue Well Inc. The company has a Windows-based network. Mark is facing a series of problems with email spam and identifying theft via phishing scams. He wants to implement the various security measures and to provide some education because it is related to the best practices while using email. Which of the following can Mark do after enabling reverse DNS lookups to minimize the amount of spam? 

A. Permit User Account Control 

B. Add Sender Policy Framework 

C. Use Read-only Domain Controller 

D. Windows Server Update Services 

Answer:

Q9. Which of the following can be implemented to ensure that the computers are using latest security updates?

A. Hardening

B. Windows Software Update Services

C. Microsoft Baseline Security Analyzer

D. Domain Name System

Answer: B

Q10. Which of the following are the uses of Network Access Protection (NAP)? 

Each correct answer represents a complete solution. Choose all that apply. 

A. It is used to protect against virus. 

B. It is used to verify the complete integrity of each device. 

C. It permits a user to access all computers and systems where he got a access permission, without entering passwords for multiple times 

D. It is used to authenticate a request for a service in a computer network. 

Answer: AB