Want to Pass 98-367 Exam In Next HOURS? Download Now →
February 6, 2018

Where to find mta 98 367


Free Instant Download NEW 98-367 Exam Dumps (PDF & VCE):
Available on: https://www.certshared.com/exam/98-367/


Q1. In which of the following is the file audit events are written when auditing is enabled? 

A. File system ACL 

B. Biometric device 

C. Network Access Control List 

D. Security event log 

Answer:


Q2. Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to implement a method to ensure that the mobile devices are in a good state of security health when they are trying to access the corporate network. For this purpose, Mark is using NAP. Which of the following will he do for those computers in the network that are not compatible with NAP? 

A. Define exceptions in NAP for computers that are not compatible with NAP. 

B. Hide those computers that are not compatible with NAP. 

C. Remove those computers that are not compatible with NAP. 

D. Do not use the NAP, if any of the computers is showing incompatibility in the entire network. 

Answer:


Q3. Which of the following helps prevent security failures? 

A. Social engineering 

B. Denial-of-Service attack 

C. Attack surface reduction 

D. Snooping 

Answer:


Q4. The workstations on your network utilize Windows XP (service pack 2 or later). Many users take their laptops on the road. You are very concerned about the security and want to have a robust firewall solution for mobile users. You have decided that all your firewalls to use the Stateful Packet Inspection (SPI) method. What must you do to provide SPI to your mobile users? 

A. You must purchase a third party firewall solution for your mobile users. 

B. Do nothing. Windows XP service pack 2 has a firewall turned on by default. 

C. Configure the Windows XP firewall to use SPI. 

D. Download the SPI template from Microsoft. 

Answer:


Q5. Which of the following are the Internet Explorer security zones? Each correct answer represents a complete solution. Choose three. 

A. Trusted sites 

B. Internet 

C. Local intranet 

D. Extranet 

Answer: ABC 


Q6. Which of the following is a networking protocol that provides centralized Authentication, Authorization, and Accounting management for computers to connect and use a network service? 

A. PEAP 

B. RADIUS 

C. Kerberos 

D. MS-CHAP v2 

Answer:


Q7. Which of the following is a disadvantage of using biometric identification?

A. It breaks the several firewall security rules.

B. It needs a new network configuration of the entire infrastructure.

C. It can be faked and will not be trusted by several organizations.

D. It is expensive and cannot be afforded by several organizations

Answer: D


Q8. Which of the following is a secret numeric password shared between a user and a system for authenticating the user to the system? 

A. Key escrow

B. Public key 

C. Private key 

D. PIN 

Answer:


Q9. Mark works as a Network Administrator fot Blue Well Inc. The company has a Windows-based network. Mark is facing a series of problems with email spam and identifying theft via phishing scams. He wants to implement the various security measures and to provide some education because it is related to the best practices while using email. Which of the following can Mark use to minimize the spam amount that is hitting the Microsoft Exchange server of the company? 

A. Enable reverse DNS lookup 

B. Use Read-only Domain Controller 

C. Add Sender Policy Framework 

D. Permit User Account Control 

Answer:


Q10. Which of the following security zones is used for Web sites that the user does not trust? 

A. Internet zone 

B. Trusted zone 

C. Restricted zone 

D. Local Intranet zone 

Answer:


Q11. Which of the following types of attack is used to configure a computer to behave as another computer on a trusted network by using the IP address or the physical address? 

A. Distributed denial of service (DDOS) attack 

B. Honeypot 

C. RIP/SAP Spoofing 

D. Identity spoofing 

Answer:


Q12. Mark works as a Network Administrator for BlueWell Inc. The company has a Windows-based network. Mark has retained his services to perform a security assessment of the company's network that has various servers exposed to the Internet. So, it may be vulnerable to an attack. Mark is using a single perimeter ?rewall, but he does not know if that is enough. He wants to review the situation and make some reliable recommendations so that he can protect the data over company's network. Which of the following will Mark use to provide better security? 

A. Tricky packet inspection 

B. Stateful packet inspection 

C. Stateless packet inspection 

D. Reaction based packet inspection 

Answer:


Q13. Which of the following is the edge between the private and locally managed-and-owned side of a network and the public side that is commonly managed by a service provider? 

A. Internet

B. Network perimeter 

C. Intranet 

D. VLAN 

Answer:


Q14. Which of the following are the features of security level in the Restricted Sites zone 

A. The protection against harmful content is provided. 

B. The maximum safeguards are used. 

C. Most of the features are disabled. 

D. The default security level is low. 

Answer: ABC 


Q15. Which of the following can be used to implement two-factor authentications? Each correct answer represents a complete solution. Choose all that apply. 

A. Firewall security rule 

B. Password 

C. Smart card 

D. Encrypted network configuration 

Answer: BC 


Q16. Mark works as a Network Administrator for BlueWell Inc. The company has a Windows-based network. Mark has retained his services to perform a security assessment of the company's network that has various servers exposed to the Internet. So, it may be vulnerable to an attack. Mark is using a single perimeter ?rewall, but he does not know if that is enough. He wants to review the situation and make some reliable recommendations so that he can protect the data over company's network. Which of the following will Mark use to inspect network information on the basis of source and destination address? 

A. Stateless packet inspection 

B. Tricky packet inspection 

C. Stateful packet inspection 

D. Reaction based packet inspection 

Answer: