Microsoft 98-367 ExamMTA Security Fundamentals Practice Test

Total Question: 123 Last Updated: Oct 11,2018
  • Updated 98-367 Dumps
  • Based on Real 98-367 Exams Scenarios
  • Free 98-367 pdf Demo Available
  • Check out our 98-367 Dumps in a new PDF format
  • Instant 98-367 download
  • Guarantee 98-367 success in first attempt
Package Select:

Questions & Answers PDF

Practice Test Software

Practice Test + PDF 30% Discount

Price: $65.95 $29.99

Buy Now Free Trial

Amazing exam 98-367 mta security fundamentals pdf secrets

Exam Code: 98-367 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: MTA Security Fundamentals Practice Test
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 98-367 Exam.

2016 Sep mta 98-367 study guide:

Q71. Which of the following are the uses of Network Access Protection (NAP)? 

Each correct answer represents a complete solution. Choose all that apply. 

A. It is used to protect against virus. 

B. It is used to verify the complete integrity of each device. 

C. It permits a user to access all computers and systems where he got a access permission, without entering passwords for multiple times 

D. It is used to authenticate a request for a service in a computer network. 

Answer: AB 


Q72. Which of the following can be implemented to ensure that the computers are using latest security updates?

A. Hardening

B. Windows Software Update Services

C. Microsoft Baseline Security Analyzer

D. Domain Name System

Answer: B


Q73. Mark works as a Systems Administrator for TechMart Incl. The company has Windows-based network. Mark has been assigned a project to track who tries to log into the system and the time of the day at which the attempts occur. He is also required to create a system to track when confidential files are opened and who is trying to open it. Now, Mark logs when someone is not able to make a successful attempt to log into the system as Administrator but he also wants to log when the user is successful to log into the system as Administrator. Which of the following is the reason of logging by Mark when a user is successfully logged into the system as well as when he is failed? 

A. To determine if and when someone is authenticating successfully with high privilege. 

B. To make sure that user is not using the Administrator account. 

C. To determine if and when someone is authenticating successfully with high privilege. 

D. To make sure that user is not facing any problem. 

Answer: C 


Q74. Mark works as a Security Officer for TechMart Inc. The company has a Windows-based network. He has bees assigned a project for ensuring the safety of the customer's money and information, not to mention the company's reputation. The company has gone through a security audit to ensure that it is in compliance with industry regulations and standards. Mark understands the request and has to do his due diligence for providing any information the regulators require as they are targeting potential security holes. In this situation, his major concern is the physical security of his company's system. He has a concern that people are authenticated to the servers in the data center. Which of the following actions will Mark take to prevent normal users from logging onto the systems?

A. Call a team member while behaving to be someone else for gaining access to sensitive information.

B. Use group policies to disable the use of floppy drives or USB drives.

C. Provide protection against a Distributed Denial of Services attack.

D. Develop a social awareness of security threats within an organization.

Answer: B


Q75. Which of the following can be used to implement two-factor authentications? Each correct answer represents a complete solution. Choose all that apply. 

A. Firewall security rule 

B. Password 

C. Smart card 

D. Encrypted network configuration 

Answer: BC 


98-367 exam topics

Replace ms 98-367:

Q76. You have bought a Windows Vista Enterprise Edition computer. You want to enable BitLocker encryption through the Control Panel. In the Startup Preference dialog box, choose the startup options that can be selected if the computer has a built-in TPM chip. 


Answer: 


Q77. You work as a Network Administrator for NetTech Inc. Your computer has the Windows 2000 Server operating system. You want to harden the security of the server. Which of the following changes are required to accomplish this? Each correct answer represents a complete solution. Choose two. 

A. Enable the Guest account. 

B. Rename the Administrator account. 

C. Remove the Administrator account. 

D. Disable the Guest account. 

Answer: BD 


Q78. You work as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains 4 Windows Server 2008 member server and 120 Windows Vista client computers. Your assistant wants to know about the settings that make up Network Access Protection (NAP) health policies. Choose the settings that are the part of Network Access Protection (NAP) health policies. 


Answer: 


Q79. Which of the following is a disadvantage of using biometric identification?

A. It breaks the several firewall security rules.

B. It needs a new network configuration of the entire infrastructure.

C. It can be faked and will not be trusted by several organizations.

D. It is expensive and cannot be afforded by several organizations

Answer: D


Q80. All your domain controllers are configured for DHCP. Each time the system is booted, it gets a new IP address from the DHCP server. You had also configured the Active Directory on the domain controllers. You want to configure your DNS settings so that it will dynamically update DNS data whenever the IP address of a domain controller changes. How will you configure for dynamic updates? 

A. Configure the DNS server for dynamic updates. 

B. Configure the DHCP server for DNS dynamic updates. 

C. Configure each domain controller for Dynamic update. 

D. Configure the Active directory for dynamic updates. 

Answer: B 


Related 98-367 Articles