98-367 Exam - MTA Security Fundamentals Practice Test

certleader.com

Q1. You want to standardize security throughout your network. You primarily use Microsoft operating systems for servers and workstations. What is the best way to have standardized security (i.e. same password policies, lockout policies, etc.) throughout the network on clients and servers? 

A. Publish the desired policies to all employees directing them to implement according to policy. 

B. Configure each computer to adhere to the standard policies. 

C. When installing new workstations or servers, image a machine that has proper security settings and install the new machine with that image. 

D. Utilize Windows Security Templates for all computers. 

Answer:

Q2. Which of the following types of viruses protects itself from antivirus programs and is more difficult to trace? 

A. Armored virus 

B. MBR virus 

C. Boot sector virus 

D. Macro virus 

Answer:

Q3. Mark works as a Security Officer for TechMart Inc. The company has a Windows-based network. He has bees assigned a project for ensuring the safety of the customer's money and information, not to mention the company's reputation. The company has gone through a security audit to ensure that it is in compliance with industry regulations and standards. Mark understands the request and has to do his due diligence for providing any information the regulators require as they are targeting potential security holes. In this situation, his major concern is the physical security of his company's system. Which of the following actions will Mark take to ensure the physical security of the company's desktop computers? 

A. Call a team member while behaving to be someone else for gaining access to sensitive information. 

B. Develop a social awareness of security threats within an organization. 

C. Use group policies to disable the use of floppy drives or USB drives. 

D. Provide protection against a Distributed Denial of Services attack. 

Answer:

Q4. In which of the following is the file audit events are written when auditing is enabled? 

A. File system ACL 

B. Biometric device 

C. Network Access Control List 

D. Security event log 

Answer:

Q5. You work as a Network Administrator for NetTech Inc. Your computer has the Windows 2000 Server operating system. You want to harden the security of the server. Which of the following changes are required to accomplish this? Each correct answer represents a complete solution. Choose two. 

A. Enable the Guest account. 

B. Rename the Administrator account. 

C. Remove the Administrator account. 

D. Disable the Guest account. 

Answer: BD 

Q6. Which of the following is the reason of properly securing an audit log? 

A. To ensure that only authorized person can check the log file. 

B. To ensure that no one can remove it as there is no back up is provided for this log. 

C. To ensure that potential hackers becomes unable to delete the event logs for covering their tracks. 

D. To ensure that potential hackers can be tracked easily without changing the network configuration. 

Answer: