98-367 Exam - MTA Security Fundamentals Practice Test

certleader.com

Q1. On which of the following is the level of security set for the local intranet zone applied? 

A. To the sites that might potentially damage your computer, or your information. 

B. To the Websites and content that are stored on a corporate, or business network. 

C. To the sites that you have specifically indicated as the ones that you trust. 

D. To all the Websites by default. 

Answer:

Q2. Which of the following is a technique used to attack an Ethernet wired or wireless network? 

A. ARP poisoning 

B. DNS poisoning 

C. Mail bombing 

D. Keystroke logging 

Answer:

Q3. Which of the following steps will help in system or host hardening? Each correct answer represents a complete solution. Choose two. 

A. Installing updated device drivers. 

B. Adding users to the administrators group. 

C. Installing or applying a patch on the host provided by the operating system manufacturer. 

D. Disabling unnecessary services from the host. 

Answer: CD

Q4. Mark works as a Security Officer for TechMart Inc. The company has a Windows-based network. He has bees assigned a project for ensuring the safety of the customer's money and information, not to mention the company's reputation. The company has gone through a security audit to ensure that it is in compliance with industry regulations and standards. Mark understands the request and has to do his due diligence for providing any information the regulators require as they are targeting potential security holes. In this situation, his major concern is the physical security of his company's system. He has a concern that people are authenticated to the servers in the data center. Which of the following actions will Mark take to prevent normal users from logging onto the systems?

A. Call a team member while behaving to be someone else for gaining access to sensitive information.

B. Use group policies to disable the use of floppy drives or USB drives.

C. Provide protection against a Distributed Denial of Services attack.

D. Develop a social awareness of security threats within an organization.

Answer: B

Q5. You have bought a Windows Vista Enterprise Edition computer. You want to enable BitLocker encryption through the Control Panel. In the Startup Preference dialog box, choose the startup options that can be selected if the computer has a built-in TPM chip. 

Answer:  

Q6. Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network. The company is adding an open, high-speed, wireless access for their customers and secured wireless for employees at all 37 branches. He wants to check the various security concerns for ensuring that business traffic is secured. He is also in under pressure to make this new feature a winning strategy for a company. Mark wants the employees to be free to troubleshoot their own wireless connections before contacting him. Which of the following is the basic troubleshooting step that he can ask them to do? 

A. To power cycle the wireless access points and then reboot the systems. 

B. To configure the network to use only Extensible Authentication Protocol (EAP). 

C. To reboot the computers they are using and then use the MAC filtering. 

D. To right-click the network icon in the system tray and then select Troubleshoot Problems. 

Answer:

Q7. Which of the following practices should be followed to keep passwords secure? Each correct answer represents a complete solution. Choose three. 

A. Change the passwords whenever there is suspicion that they may have been compromised. 

B. A password should be alpha-numeric. 

C. A password should not be more than five words. 

D. Never write down a password. 

Answer: ABD 

Q8. Which of the following are the types of group scopes? Each correct answer represents a complete solution. Choose all that apply. 

A. Global 

B. Domain Users 

C. Universal 

D. Domain local 

Answer: ACD 

Q9. Which of the following security features of IE 7+ makes it more difficult for malware to be installed? 

A. Security zones 

B. Phishing filter 

C. Protected mode 

D. Pop-up blocker 

Answer:

Q10. Which of the following viruses cannot be detected by signature-based antivirus?

A. Macro virus

B. Boot sector virus

C. MBR virus

D. Polymorphic virus

Answer: