100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Questions, MTA 98-367: Security Fundamentals Overview

Rating
-
Sold
-
Pages
45
Grade
A+
Uploaded on
28-10-2024
Written in
2024/2025

You can reduce risk by reducing - answer-vulnerabilities An implementation of which security principle ensures that secrets stay secret - answer-Confidentiality The implementation of techniques that map to which security principle help to ensure that an unauthorized change to data is detected - answer-Integrity A basic security principle states that users, resources, and applications should be granted only the rights and permissions needed to perform a task. the principle of ______________ ____________. - answer-least privilege What is meant by reducing the attack surface of a system? A. Disabling needed services B. Removing unneeded protocols C. Keeping a system up to date D. Disabling the firewall - answer-B (Removing unneeded protocols) What tool can you use to create a comprehensive security policy as an XML file on a Windows Server 2008 system? A. Microsoft Baseline Security Analyzer (MBSA) B. System Center Configuration Manager (SCCM) C. Security Configuration Wizard (SCW) D. Windows Server Update Services (WSUS) - answer-C (Security Configuration Wizard (SCW)) Of the following choices, what is the best method to protect against malware? A. Installing antivirus software and keeping it up to date B. Disabling unneeded services C. Removing unnecessary protocols D. Enabling a firewall - answer-A (Installing antivirus software and keeping it up to date) What is the primary difference between a virus and a worm? A. There is none. They're both the same. B. A worm requires user intervention to spread, but a virus doesn't. C. A virus requires user intervention to spread, but a worm doesn't. D. A virus is malware, but a worm is antivirus software. - answer-C (A virus requires user intervention to spread, but a worm doesn't) A buffer-overflow attack can gain access to a system's _________ - answer-memory. Which of the following is a type of malware that appears to be something else? A. Buffer overflow B. Trojan horse C. Virus D. Worm - answer-B (Trojan horse) ___________ represent a real threat today. - answer-Botnets The majority of spam is sent out by _____________. - answer-Botnets Microsoft has created an antivirus tool for desktop operating systems. It's available for free for home and small-business users and provides real-time protection. What is this tool? - answer-Microsoft security essentials TRUE FALSESecurity Essentials 2010 is a type of Trojan horse known as rogueware - answer-false What tool can you use for free on Windows Server 2008 to check for and remove many types of malware threats? (Choose all that apply.) A. Security Essentials 2010 B. Microsoft Security Essentials C. Microsoft Windows Malicious Software Removal Tool D. Microsoft Forefront - answer-C (Microsoft Windows Malicious Software Removal Tool) One method of conducting pharming is through DNS _____________. - answer-Cache Poisoning Which of the following can protect email from potential threats? (Choose all that apply.) A. Antivirus software B. Disabling automatic display of graphics C. Enabling pharming D. Educating users (use spaces between the letters ) - answer-A (Antivirus software) B (Disabling automatic display of graphics ) D (Educating users) What is the difference between identification and authentication? A. Nothing. They're the same. B. Identification proves an identity. C. Authentication proves an identity. D. Identification authenticates an individual, and authentication provides authorization. - answer-C (Authentication proves an identity.) A brute-force attack is one of many methods used to discover _____________. - answer-Passwords A ____________ is an authentication example using the something you have factor. - answer-smart card Which one of the following is the strongest password? A. password B. Password C. PAssWord D. Pa$$w0rd - answer-D (Pa$$w0rd) You can enforce a password policy through_________ - answer-Group Policy If users forget their password, they can reset the password with a _____________, as long as they created it before forgetting their password. - answer-Password- reset disk What factor of authentication is used when a user's fingerprints are checked? - answer-Something you are Kerberos clients must have their time within five minutes of each other to prevent a _____________ error. - answer-time skew Of the following choices, what isn't a valid use of a RADIUS server A. Authenticate VPN clients B. Authenticate wireless clients C. Provide port-based authentication D. Provide authentication for 802x database servers - answer-D (Provide authentication for 802x database servers) Of the following choices, which authentication protocol is the weakest? A. Kerberos B. LM C. NTLMv1 D. NTLMv2 - answer-B (LM) What are the three As (AAA) of security? A. Authentication, authorization, and accounting B. Authentication, accountability, and accounting C. Accountability, access control, and accounting D. Authorization, access control, and auditing - answer-A (Authentication, authorization, and accounting) True false: If you want to audit all access to a folder, all you have to do is enable Object Access auditing in the Audit Policy. - answer-False Which Audit Policy selection records any time a user logs onto a local system? A. Logon Events B. Account Logon Events C. System Events D. Process Tracking - answer-A (Logon Events) 4. Which Audit Policy selection records modifications to Active Directory? A. Privilege Use B. Account Management Events C. Directory Service Access D. Policy Change - answer-C (Directory Service Access) If you want to ensure that an audit-log entry records each time a system is shut down, you should enable Successful entries for _____________ auditing. - answer-System events What tool can you use to view audited events? - answer-Event viewer Which of the following choices can be used to automatically collect events on a single server from multiple servers? A. Process Tracking Events auditing B. MBSA C. Automatic archiving D. Event subscriptions - answer-D (Event subscriptions) You can secure audit logs with _________ media. - answer-WORM (WRITE ONCE READ MANY) Where can you get MBSA? FREE FROM _________ - answer-microsoft ___________ can detect weak passwords for accounts on Microsoft systems. - answer-MBSA What causes the Windows 7 Desktop to dim when a user attempts an action requiring administrative approval? - answer-UAC True or false If files are encrypted on a server using EFS, they're automatically encrypted when a user uses offline folders. - answer-False Which of the following can't be used to update a system? A. Automatic Updates B. WSUS C. SCCM D. DNS - answer-D (DNS) You can use ____________ to configure all computers in a domain to use automatic updates. - answer-group policy True FALSE: After Microsoft has released security updates, clients are no longer vulnerable to the exploits that the updates resolve. - answer-False What kind of DNS record resolves an IP address to a host name? A. A record B. PTR record C. SPF record D. MX record - answer-B (PTR record) You want to deploy a domain controller to a branch office. However, the branch office has very little physical security. What should you do? A. Don't deploy the domain controller. B. Deploy DNS with the domain controller, and use secure dynamic updates. C. Deploy a read-only domain controller (RODC). D. Remove Administrator accounts before deploying the domain controller. - answer-C (Deploy a read-only domain controller (RODC)) True or false You should separate DNS from Active Directory Domain Services for enhanced security. - answer-False True or false You should separate Terminal Services from Active Directory Domain Services for enhanced security. - answer-True True or false: You can enable secure dynamic updates only on DNS servers installed on a domain controller. - answer-True Which is used to validate DNSsec responses? - answer-Digital signature You want to provide public access to a Web Server. Visitors to the Web Server should not have access to your internal network. You need to configure what? - answer-A perimeter network. (Basically a DMZ) Which authentication protocol uses time-stamped tickets to minimize the likelihood of replay attacks? - answer-Kerberos Which represents a security threat to your DNS environment? - answer-Footprinting, the process of maliciously gaining info about domains. What is the advantage of preventing a wireless access point (WAP) from broadcasting its Service Set Identifier (SSID)? - answer-It prevents the WAP from appearing in the list of available wireless networks. Which is the role of Health Registration Authority (HRA) in Network Access Protection (NAP)? - answer-Validating and requesting a health certificate for compliant clients. You are a network administrator. You need to minimize the attack surface for your network. What would this involve? - answer-Ensuring that only required features are enabled. Malicious software that masquerades as a beneficial utility is known as? - answer-a trojan horse. Which are common symptoms of a virus infection? (2 answers) - answer-1. New icons appear spontaneously on the desktop. 2. An installed antivirus program is disabled and will not restart. A computer that is designed to entice hackers to attack it is known as a? - answer-honeyspot

Show more Read less
Institution
S, MTA 98-367:
Course
S, MTA 98-367:

Content preview

Questions, MTA 98-367: Security
Fundamentals Overview
You can reduce risk by reducing - answer-vulnerabilities

An implementation of which security principle ensures that secrets stay
secret - answer-Confidentiality

The implementation of techniques that map to which security principle help
to ensure that an unauthorized change to data is detected - answer-Integrity

A basic security principle states that users, resources, and applications
should be granted only the rights and permissions needed to perform a task.
the principle of ______________ ____________. - answer-least privilege

What is meant by reducing the attack surface of a system?
A. Disabling needed services
B. Removing unneeded protocols
C. Keeping a system up to date
D. Disabling the firewall - answer-B (Removing unneeded protocols)

What tool can you use to create a comprehensive security policy as an XML
file on a Windows Server 2008 system?
A. Microsoft Baseline Security Analyzer (MBSA)
B. System Center Configuration Manager (SCCM)
C. Security Configuration Wizard (SCW)
D. Windows Server Update Services (WSUS) - answer-C (Security
Configuration Wizard (SCW))

Of the following choices, what is the best method to protect against
malware?
A. Installing antivirus software and keeping it up to date
B. Disabling unneeded services
C. Removing unnecessary protocols
D. Enabling a firewall - answer-A (Installing antivirus software and keeping it
up to date)

What is the primary difference between a virus and a worm?
A. There is none. They're both the same.
B. A worm requires user intervention to spread, but a virus doesn't.
C. A virus requires user intervention to spread, but a worm doesn't.
D. A virus is malware, but a worm is antivirus software. - answer-C (A virus
requires user intervention to spread, but a worm doesn't)

,A buffer-overflow attack can gain access to a system's _________ - answer-
memory.

Which of the following is a type of malware that appears to be something
else?
A. Buffer overflow
B. Trojan horse
C. Virus
D. Worm - answer-B (Trojan horse)

___________ represent a real threat today. - answer-Botnets

The majority of spam is sent out by _____________. - answer-Botnets

Microsoft has created an antivirus tool for desktop operating systems. It's
available for free for home and small-business users and provides real-time
protection. What is this tool? - answer-Microsoft security essentials

TRUE FALSESecurity Essentials 2010 is a type of Trojan horse known as
rogueware - answer-false

What tool can you use for free on Windows Server 2008 to check for and
remove many types of malware threats? (Choose all that apply.)
A. Security Essentials 2010
B. Microsoft Security Essentials
C. Microsoft Windows Malicious Software Removal Tool
D. Microsoft Forefront - answer-C (Microsoft Windows Malicious Software
Removal Tool)

One method of conducting pharming is through DNS _____________. - answer-
Cache Poisoning

Which of the following can protect email from potential threats?
(Choose all that apply.)
A. Antivirus software
B. Disabling automatic display of graphics
C. Enabling pharming
D. Educating users

(use spaces between the letters ) - answer-A (Antivirus software)
B (Disabling automatic display of graphics )
D (Educating users)

What is the difference between identification and authentication?
A. Nothing. They're the same.
B. Identification proves an identity.

,C. Authentication proves an identity.
D. Identification authenticates an individual, and authentication provides
authorization. - answer-C (Authentication proves an identity.)

A brute-force attack is one of many methods used to discover _____________. -
answer-Passwords

A ____________ is an authentication example using the something you have
factor. - answer-smart card

Which one of the following is the strongest password?
A. password
B. Password
C. PAssWord
D. Pa$$w0rd - answer-D (Pa$$w0rd)

You can enforce a password policy through_________ - answer-Group Policy

If users forget their password, they can reset the password with a
_____________, as long as they created it before forgetting their password. -
answer-Password- reset disk

What factor of authentication is used when a user's fingerprints are checked?
- answer-Something you are

Kerberos clients must have their time within five minutes of each other to
prevent a _____________ error. - answer-time skew

Of the following choices, what isn't a valid use of a RADIUS server
A. Authenticate VPN clients
B. Authenticate wireless clients
C. Provide port-based authentication
D. Provide authentication for 802x database servers - answer-D (Provide
authentication for 802x database servers)

Of the following choices, which authentication protocol is the weakest?
A. Kerberos
B. LM
C. NTLMv1
D. NTLMv2 - answer-B (LM)

What are the three As (AAA) of security?
A. Authentication, authorization, and accounting
B. Authentication, accountability, and accounting
C. Accountability, access control, and accounting

, D. Authorization, access control, and auditing - answer-A (Authentication,
authorization, and accounting)

True false: If you want to audit all access to a folder, all you have to do is
enable Object Access auditing in the Audit Policy. - answer-False

Which Audit Policy selection records any time a user logs onto a local
system?
A. Logon Events
B. Account Logon Events
C. System Events
D. Process Tracking - answer-A (Logon Events)

4. Which Audit Policy selection records modifications to Active Directory?
A. Privilege Use
B. Account Management Events
C. Directory Service Access
D. Policy Change - answer-C (Directory Service Access)

If you want to ensure that an audit-log entry records each time a system is
shut down, you should enable Successful entries for _____________ auditing. -
answer-System events

What tool can you use to view audited events? - answer-Event viewer

Which of the following choices can be used to automatically collect events on
a single server from multiple servers?
A. Process Tracking Events auditing
B. MBSA
C. Automatic archiving
D. Event subscriptions - answer-D (Event subscriptions)

You can secure audit logs with _________ media. - answer-WORM (WRITE
ONCE READ MANY)

Where can you get MBSA? FREE FROM _________ - answer-microsoft

___________ can detect weak passwords for accounts on Microsoft systems. -
answer-MBSA

What causes the Windows 7 Desktop to dim when a user attempts an action
requiring administrative approval? - answer-UAC

True or false If files are encrypted on a server using EFS, they're
automatically encrypted when a user uses offline folders. - answer-False

Written for

Institution
S, MTA 98-367:
Course
S, MTA 98-367:

Document information

Uploaded on
October 28, 2024
Number of pages
45
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TOPDOCTOR Abacus College, Oxford
View profile
Follow You need to be logged in order to follow users or courses
Sold
10
Member since
2 year
Number of followers
5
Documents
3395
Last sold
4 months ago
TOPGRADER!!

Looking for relevant and updated study material to help you ace your exams? TOPTIERGRADES has your back!!! I have essential exams, test-banks, study bites, assignments all graded A+, Have Complete solutions, and are updated regularly. Please feel free to message me if you are looking for a specific test bank that is not listed on my profile or want a test bank or exam sent to you directly as google doc link. In the event that any of the materials have an issue, please let me know and I\'ll do my best to resolve it or provide an alternative. Thank You & All The Very BEST!!!!!

Read more Read less
5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions