Sie sind auf Seite 1von 1

MTA 98-367: Security Fundamentals

Study online at quizlet.com/_pec85

1. A computer that is designed to honeyspot 14. Which protocol is used for smart card Kerberos
entice hackers to attack it is known interactive logon to the local WIndows Active
as a? Directory domain?
2. Malicious software that masquerades a trojan horse. 15. Which represents a security threat to your Footprinting,
as a beneficial utility is known as? DNS environment? the process
of
3. Microsoft Security Baseline Analyzer Identify security
maliciously
(MSBA) is used to? misconfigurations
gaining info
and missing security
about
updates on network
domains.
computers.
16. Which type of certification authority (CA) Root CA.
4. Network Access Protection (NAP) is Windows updates,
issues its own certificates?
able to check the status of? firewall protection,
spyware protection, 17. Which type of security service is concerned Integrity.
and antivirus with preventing or detecting any tampering
protection. with data?
5. SYSKEY improves physical security boot the server. 18. Which wireless security method uses WPA uses
by requiring a password or special Temporary Key Integrity Protocol (TKIP) and requires
floppy disk to? encryption? TKIP.
6. To implement multifactor A smart card and a 19. You are a network administrator. You need to Ensuring
authentication you should : pin minimize the attack surface for your network. that only
What would this involve? required
7. What is the advantage of preventing It prevents the WAP
features are
a wireless access point (WAP) from from appearing in
enabled.
broadcasting its Service Set the list of available
Identifier (SSID)? wireless networks. 20. You have a wireless network. You need to Implement
ensure that only specific client computers MAC
8. What is the primary purpose of a To protect the
are able to access the wireless network. What filtering.
firewall? network by
should you do?
restricting incoming
and outgoing 21. Your Active Directory domain's network Create a
network traffic. computers access the Internet through a domain-
Network Address Translation (NAT) server level Group
9. What will happen when you move a The file remains
deployed on a perimeter network. You need Policy
file you encrypted through the encrypted.
to ensure that the same Internet Explorer (IE) (GPO).
encrypting file system (EFS) to an
browser security policies are used by tall
unencrypted folder on an NTFS
clients. What should you do?
partition?
22. You want to ensure that mobile clients Windows
10. Which are common symptoms of a 1. New icons appear
receive timely operating system updates. Update
virus infection? (2 answers) spontaneously on the
Some clients rarely connect to the internal Agent
desktop.
business network. Which should you use? (WUA).
2. An installed
antivirus program is 23. You want to provide public access to a Web A perimeter
disabled and will not Server. Visitors to the Web Server should not network.
restart. have access to your internal network. You (Basically a
need to configure what? DMZ)
11. Which authentication protocol uses Kerberos
time-stamped tickets to minimize the
likelihood of replay attacks?
12. Which is the role of Health Validating and
Registration Authority (HRA) in requesting a health
Network Access Protection (NAP)? certificate for
compliant clients.
13. Which is used to validate DNSsec Digital signature
responses?

Das könnte Ihnen auch gefallen