98-367 Exam - MTA Security Fundamentals Practice Test

certleader.com

Q1. All your domain controllers are configured for DHCP. Each time the system is booted, it gets a new IP address from the DHCP server. You had also configured the Active Directory on the domain controllers. You want to configure your DNS settings so that it will dynamically update DNS data whenever the IP address of a domain controller changes. How will you configure for dynamic updates? 

A. Configure the DNS server for dynamic updates. 

B. Configure the DHCP server for DNS dynamic updates. 

C. Configure each domain controller for Dynamic update. 

D. Configure the Active directory for dynamic updates. 

Answer:

Q2. Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network. The company had a many outbreaks of viruses on the network that are propagated via email. Mark wants to educate his team about malicious software and email. Which of the following will he suggest his team members to do when a suspicious email that contains an embedded hyperlink is received from a customer? 

A. To delete the email and then contact Mark and the customer. 

B. To forward the email to other team members for warning them that the email is not legitimate. 

C. To click the hyperlink for checking the result. 

D. To resend the email to the customer from which it seems to be sent. 

Answer:

Q3. Mark works as a Systems Administrator for TechMart Incl. The company has Windows-based network. Mark has been assigned a project to track who tries to log into the system and the time of the day at which the attempts occur. He is also required to create a system to track when confidential files are opened and who is trying to open it. Now, Mark logs when someone is not able to make a successful attempt to log into the system as Administrator but he also wants to log when the user is successful to log into the system as Administrator. Which of the following is the reason of logging by Mark when a user is successfully logged into the system as well as when he is failed? 

A. To determine if and when someone is authenticating successfully with high privilege. 

B. To make sure that user is not using the Administrator account. 

C. To determine if and when someone is authenticating successfully with high privilege. 

D. To make sure that user is not facing any problem. 

Answer:

Q4. Mark works as a Desktop Administrator for TechMart Inc. The company has a Windows-based network. He has bees assigned a project to upgrade the browsers to Internet Explorer (IE) 8 for working with the latest Internet technologies Mark wants to ensure that the company uses a number of the security features built into the browser while maintaining functionality within the company's intranet. Mark is also educating his users to be good Internet citizens and use the safe web sur?ng. Mark asked his team to be assured that they are on a secured website. What they will do? 

A. Take a look for a padlock in the lower right corner of the browser and https:// in the address bar. 

B. Provide protection against a Distributed Denial of Services attack. 

C. Call a team member while behaving to be someone else for gaining access to sensitive information. 

D. Go into the Internet Options, select the Security, and add the intranet site to the list of Local Intranet Site. 

Answer:

Q5. Which of the following functions are performed by a firewall? Each correct answer represents a complete solution. Choose all that apply. 

A. It blocks unwanted traffic. 

B. It hides vulnerable computers that are exposed to the Internet. 

C. It enhances security through various methods, including packet filtering, circuit-level filtering, and application filtering. 

D. It logs traffic to and from the private network. 

Answer: ABCD 

Q6. Which of the following is used to describe the policy of maximum password age?

A. It is used to determine how old the user has to create a password.

B. It is a time duration before a password is required to be public.

C. It is a time duration before a password is required to be changed.

D. It determines how old the password must be before the user is permitted to change it.

Answer: C

Q7. Which of the following MMC snap-in consoles is used to administer the replication of directory data among all sites in an Active Directory Domain Services (AD DS) forest? 

A. Active Directory Domains and Trusts

B. Active Directory Administrative Center 

C. Group Policy Management Console 

D. Active Directory Sites and Services 

Answer:

Q8. Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to implement a method to ensure that the mobile devices are in a good state of security health when they are trying to access the corporate network. Which of the following is a control or strategy that Mark will implement to assure the security health?

A. TCP/IP protocol

B. Kerberos

C. Single Sign On

D. Network Access Protection

Answer: D

Q9. Which of the following security methods can be used to detect the DoS attack in order to enhance the security of the network? 

A. Protocol analyzer

B. WIPS 

C. WLAN controller 

D. Spectrum analyzer 

Answer:

Q10. Which of the following is a physical address stored in the Network Interface card on your system or any other device residing on your network?

A. IP address

B. I/O address

C. MAC Address

D. Broadcast address

Answer: C