98-367 Premium Bundle

98-367 Premium Bundle

MTA Security Fundamentals Practice Test Certification Exam

4.5 
(18705 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

Microsoft 98-367 Free Practice Questions

Q1. Which of the following is an authentication protocol? 

A. Kerberos 

B. LDAP 

C. TLS 

D. PPTP 

Answer:

Q2. Mark works as a Systems Administrator for TechMart Incl. The company has Windows-based network. Mark has been assigned a project to track who tries to log into the system and the time of the day at which the attempts occur. He is also required to create a system to track when confidential files are opened and who is trying to open it. Now, Mark logs when someone is not able to make a successful attempt to log into the system as Administrator but he also wants to log when the user is successful to log into the system as Administrator. Which of the following is the reason of logging by Mark when a user is successfully logged into the system as well as when he is failed? 

A. To determine if and when someone is authenticating successfully with high privilege. 

B. To make sure that user is not using the Administrator account. 

C. To determine if and when someone is authenticating successfully with high privilege. 

D. To make sure that user is not facing any problem. 

Answer:

Q3. Which of the following protocols is used to secure workstation and computer authentication across the network? 

A. TCP/IP

B. Network Directory Access Protocol 

C. Kerberos 

D. Lightweight Directory Access Protocol 

Answer:

Q4. Which of the following can be implemented to ensure that the computers are using latest security updates?

A. Hardening

B. Windows Software Update Services

C. Microsoft Baseline Security Analyzer

D. Domain Name System

Answer: B

Q5. Which of the following can be installed and configured to prevent suspicious emails from entering the user's network?

A. Kerberos

B. Single sign-on (SSO)

C. TCP/IP protocol

D. Microsoft Forefront and Threat Management Gateway

Answer:

Q6. You have bought a Windows Vista Enterprise Edition computer. You want to enable BitLocker encryption through the Control Panel. In the Startup Preference dialog box, choose the startup options that can be selected if the computer has a built-in TPM chip. 

Answer:  

Q7. Sam works as a Web Developer for McRobert Inc. He wants to control the way in which a Web browser receives information and downloads content from Web sites. Which of the following browser settings will Sam use to accomplish this? 

A. Security 

B. Certificate 

C. Cookies 

D. Proxy server 

Answer:

Q8. Which of the following is a set of rules that control the working environment of user accounts and computer accounts? 

A. Mandatory Access Control 

B. Access control list 

C. Group Policy 

D. Intrusion detection system 

Answer:

Q9. Which of the following protocols transmits user credentials as plaintext?

A. CHAP

B. MS-CHAP v2

C. PAP

D. MS-CHAP

Answer: C

Q10. Which of the following are the features of security level in the Restricted Sites zone 

A. The protection against harmful content is provided. 

B. The maximum safeguards are used. 

C. Most of the features are disabled. 

D. The default security level is low. 

Answer: ABC 

Q11. You are taking over the security of an existing network. You discover a machine that is not being used as such, but has software on it that emulates the activity of a sensitive database server. What is this?

A. A Polymorphic Virus

B. A Honey Pot

C. A reactive IDS.

D. A Virus

Answer:

Q12. You work as a Network Administrator for TechMart Inc. The company has a Windows-based network. After completing a security audit of the company's Microsoft Windows Server 2008 R2 file servers, you have determined that folder and share security requires a revision on the basis of corporate reorganization. You have noticed that some shares on the file system are not secured. Which of the following is the default permission setting that you have used when a share is created? 

A. Everyone with Change permission 

B. Administrators with the Full Control permission 

C. Administrators with the Change permission 

D. Everyone with Read permission 

Answer:

Q13. Which of the following security zones is used for Web sites that the user does not trust? 

A. Internet zone 

B. Trusted zone 

C. Restricted zone 

D. Local Intranet zone 

Answer:

Q14. Which of the following ports is used by the Remote Desktop Protocol? 

A. 80 

B. 23 

C. 3389 

D. 110 

Answer:

Q15. Which of the following is a technique used to attack an Ethernet wired or wireless network? 

A. ARP poisoning 

B. DNS poisoning 

C. Mail bombing 

D. Keystroke logging 

Answer:

Q16. On which of the following is the level of security set for the local intranet zone applied? 

A. To the sites that might potentially damage your computer, or your information. 

B. To the Websites and content that are stored on a corporate, or business network. 

C. To the sites that you have specifically indicated as the ones that you trust. 

D. To all the Websites by default. 

Answer:

START 98-367 EXAM