Exam Code: 98-367 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: MTA Security Fundamentals Practice Test
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 98-367 Exam.
Q61. You work as a Network Administrator for NetTech Inc. Your computer has the Windows 2000 Server operating system. You want to harden the security of the server. Which of the following changes are required to accomplish this? Each correct answer represents a complete solution. Choose two.
A. Enable the Guest account.
B. Rename the Administrator account.
C. Remove the Administrator account.
D. Disable the Guest account.
Answer: BD
Q62. The stronger password is a critical element in the security plan. Which of the following are the characteristics used to make up a strong password?
A. It contains more than seven hundred characters and does not contain the user name, real name, or any name that can be guessed by the attacker easily.
B. It contains more than seven characters and does not contain the user name, real name, or anyname that can be guessed by the attacker easily.
C. It contains the user name, real name, or any name that can be remembered easily and does not contain more than seven characters.
D. It contains more than seven characters and the user name, real name, or any name.
Answer: B
Q63. Which of the following is a US Federal government algorithm created to generate a secure message digest?
A. DSA
B. RSA
C. Triple DES
D. SHA
Answer: D
Q64. Which of the following layers defines the mechanisms that allow data to be passed from one network to another?
A. Network layer
B. Session layer
C. Physical layer
D. Data-link layer
Answer: A
Q65. Mark works as a Network Administrator for BlueWell Inc. The company has a Windows-based network. Mark has retained his services to perform a security assessment of the company's network that has various servers exposed to the Internet. So, it may be vulnerable to an attack. Mark is using a single perimeter ?rewall, but he does not know if that is enough. He wants to review the situation and make some reliable recommendations so that he can protect the data over company's network. Which of the following will Mark do to accomplish the task?
A. Outsource the related services.
B. Encrypt the data and than start transmission.
C. Locate the Internet-exposed servers and devices in an internal network.
D. Create a perimeter network to isolate the servers from the internal network.
Answer: D
Q66. Which of the following are the Internet Explorer security zones? Each correct answer represents a complete solution. Choose three.
A. Trusted sites
B. Internet
C. Local intranet
D. Extranet
Answer: ABC
Q67. Which of the following can be installed and configured to prevent suspicious emails from entering the user's network?
A. Kerberos
B. Single sign-on (SSO)
C. TCP/IP protocol
D. Microsoft Forefront and Threat Management Gateway
Answer: D
Q68. Which of the following applications captures network packets as they traverse a network and displays them to the attacker?
A. Keylogger
B. Sniffer
C. Key fob
D. Protocol analyzer
Answer: B
Q69. Which of the following protects against unauthorized access to confidential information via encryption and works at the network layer?
A. Firewall
B. NAT
C. IPSec
D. MAC address
Answer: C
Q70. Which of the following is used to protect all files stored on the drive on which Windows is installed?
A. SocketShield
B. Firewall
C. Bitlocker
D. Hardware keylogger
Answer: C