98-367 Premium Bundle

98-367 Premium Bundle

MTA Security Fundamentals Practice Test Certification Exam

4.5 
(7995 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Microsoft 98-367 Free Practice Questions

Q1. Which of the following can be implemented to ensure that the computers are using latest security updates?

A. Hardening

B. Windows Software Update Services

C. Microsoft Baseline Security Analyzer

D. Domain Name System

Answer: B

Q2. Which of the following is a secret numeric password shared between a user and a system for authenticating the user to the system? 

A. PIN 

B. Private key 

C. Key escrow 

D. Public key 

Answer:

Q3. You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008

network environment. The network is configured as a Windows Active Directory-based single forest

single domain network. You want to configure Network Access Protection (NAP) on your network.

You want that the clients connecting to the network must contain certain configurations. Which of

the following Windows components ensure that only clients having certain health benchmarks

access the network resources? Each correct answer represents a part of the solution. Choose two.

A. Windows Firewall

B. System Health Agents (SHA)

C. Terminal Service

D. System Health Validators (SHV)

E. TS Gateway

Answer: BD 

Q4. All your domain controllers are configured for DHCP. Each time the system is booted, it gets a new IP address from the DHCP server. You had also configured the Active Directory on the domain controllers. You want to configure your DNS settings so that it will dynamically update DNS data whenever the IP address of a domain controller changes. How will you configure for dynamic updates? 

A. Configure the DNS server for dynamic updates. 

B. Configure the DHCP server for DNS dynamic updates. 

C. Configure each domain controller for Dynamic update. 

D. Configure the Active directory for dynamic updates. 

Answer:

Q5. Which of the following types of attack is used to configure a computer to behave as another computer on a trusted network by using the IP address or the physical address? 

A. Distributed denial of service (DDOS) attack 

B. Honeypot 

C. RIP/SAP Spoofing 

D. Identity spoofing 

Answer:

Q6. Which of the following is a process in which data is changed before or while it is entered into a computer system? 

A. Data diddling 

B. Authentication 

C. Domain kiting 

D. Packet sniffing 

Answer:

Q7. Which of the following protocols transmits user credentials as plaintext?

A. CHAP

B. MS-CHAP v2

C. PAP

D. MS-CHAP

Answer: C

Q8. Which of the following is used to describe the policy of maximum password age?

A. It is used to determine how old the user has to create a password.

B. It is a time duration before a password is required to be public.

C. It is a time duration before a password is required to be changed.

D. It determines how old the password must be before the user is permitted to change it.

Answer: C

Q9. Which of the following terms refers to the access of a wireless Internet connection by bringing one's own computer within the range of another's wireless connection, and using that service without the subscriber's explicit permission or knowledge?

A. Samhain

B. Snooping

C. Piggybacking

D. Vampire tap

Answer: C

Q10. Which of the following tools traces all or specific activities of a user on a computer?

A. Task Manager

B. Event Viewer

C. Network Monitor

D. Keylogger

Answer: D

Q11. Which of the following is an organization that defines standards for anti-virus software? 

A. ICSA

B. IETF 

C. IIS 

D. IEEE 

Answer:

Q12. Your Web server crashes at exactly the point where it reaches 1 million total visits. You discover the cause of the server crash is malicious code. Which description best fits this code? 

A. Virus 

B. Worm 

C. Polymorphic Virus 

D. Logic Bomb 

Answer:

Q13. Which of the following is used to create a secured connection over an unsecured network? 

A. TCP/IP protocol 

B. Virtual Private Network (VPN) 

C. Single Sign-on (SSO) 

D. Kerberos 

Answer:

Q14. Which of the following is the result of setting the value of Enforce Password History to 10?

A. The system will remember the last 10 passwords and will not permit the user to reuse any of those passwords.

B. The user is granted with a permission of 10 attempts to validate the password

C. The password can be changed only after 10 days of its creation.

D. The system will automatically generate the new 10 passwords that can be used by the user.

Answer: A

Q15. Which of the following types of viruses protects itself from antivirus programs and is more difficult to trace? 

A. Armored virus 

B. MBR virus 

C. Boot sector virus 

D. Macro virus 

Answer:

Q16. Which of the following applications captures network packets as they traverse a network and displays them to the attacker? 

A. Keylogger 

B. Sniffer 

C. Key fob 

D. Protocol analyzer 

Answer:

START 98-367 EXAM