Act now and download your Microsoft 98-367 test today! Do not waste time for the worthless Microsoft 98-367 tutorials. Download Regenerate Microsoft MTA Security Fundamentals Practice Test exam with real questions and answers and begin to learn Microsoft 98-367 with a classic professional.
Q91. What are the main classes of biometric characteristics? Each correct answer represents a complete solution. Choose two.
A. Psychological
B. Behavioral
C. Fundamental
D. Physiological
Answer: BD
Q92. Which of the following is a secret numeric password shared between a user and a system for authenticating the user to the system?
A. Key escrow
B. Public key
C. Private key
D. PIN
Answer: D
Q93. Which of the following security zones is used for Web sites that the user does not trust?
A. Internet zone
B. Trusted zone
C. Restricted zone
D. Local Intranet zone
Answer: C
Q94. Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network He has been assigned a project to take care of the sensitive data that can be hacked if any of the laptop computers would be misplaced. Mark is required to ensure the con? dentiality of data on the mobile stations, all of which are running Windows 7 Enterprise. Which of the following will Mark use to accomplish the task?
A. BitLocker
B. Confidential File System
C. Kerberos
D. Encrypting File System (EFS)
Answer: A
Q95. Mark work as a System Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to allow the remote travel agents to be able to access the corporate network so that they are free to check email and post appointments that are booked for the particular day.
Mark has decided to permit the travel agents to use their home computers but he is required to be assured that the information is not compromised by anyone because the security of client information is on the top priority for him. Mark is concerned about probable attackers will be able to penetrate the VPN. Which of the following will Mark use to attract the attackers for understanding their methods?
A. CIA Triangle
B. Attack surface
C. Honeypot
D. Social engineering
Answer: C
Q96. You want to standardize security throughout your network. You primarily use Microsoft operating systems for servers and workstations. What is the best way to have standardized security (i.e. same password policies, lockout policies, etc.) throughout the network on clients and servers?
A. Publish the desired policies to all employees directing them to implement according to policy.
B. Configure each computer to adhere to the standard policies.
C. When installing new workstations or servers, image a machine that has proper security settings and install the new machine with that image.
D. Utilize Windows Security Templates for all computers.
Answer: D