Microsoft Exam Security fundamentals Version: 9.0 [ Total Questions: 123 ]

Similar documents
Vendor: Microsoft. Exam Code: Exam Name: MTA Security Fundamentals Practice Test. Version: Demo

Pass Microsoft Exam

User Authentication. Modified By: Dr. Ramzi Saifan

User Authentication. Modified By: Dr. Ramzi Saifan

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class

Security+ Practice Questions Exam Cram 2 (Exam SYO-101) Copyright 2004 by Que Publishing. International Standard Book Number:

COPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51

Example: Configuring DHCP Snooping and DAI to Protect the Switch from ARP Spoofing Attacks

Network Security and Cryptography. 2 September Marking Scheme

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.

(2½ hours) Total Marks: 75

Authentication. Chapter 2

Modern IP Communication bears risks

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

CSC 4900 Computer Networks: Security Protocols (2)

Verteilte Systeme (Distributed Systems)

ELEC5616 COMPUTER & NETWORK SECURITY

Worksheet - Reading Guide for Keys and Passwords

CS Computer Networks 1: Authentication

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer

Security Pop Quiz Domain 5 for the CompTIA A+, Network+ and Microsoft Certifications

Chapter 2. Switch Concepts and Configuration. Part II

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Overview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks

SonicWALL Addendum. A Supplement to the SonicWALL Internet Security Appliance User's Guide

Systems and Network Security (NETW-1002)

Security+ SY0-501 Study Guide Table of Contents

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

Access Controls. CISSP Guide to Security Essentials Chapter 2

MU2b Authentication, Authorization and Accounting Questions Set 2

Chapter 8. User Authentication

Remote Administration

HikCentral V.1.1.x for Windows Hardening Guide

Grandstream Networks, Inc. GWN7000 OpenVPN Site-to-Site VPN Guide

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

Security issues: Encryption algorithms. Threats Methods of attack. Secret-key Public-key Hybrid protocols. CS550: Distributed OS.

ClientNet. Portal Admin Guide

Security: Focus of Control. Authentication

SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA

Ken Agress, Senior Consultant PlanNet Consulting, LLC.

MOC 6420A: Fundamentals of Windows Server 2008 Network and Applications Infrastructure

CS System Security Mid-Semester Review

Question No: 2 Which identifier is used to describe the application or process that submitted a log message?

Microsoft Exam Mobility and Devices Fundamentals Version: 6.0 [ Total Questions: 37 ]

SE420 Software Quality Assurance

One of the most important skills to have if you are going to support networked

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

CompTIA. SY0-501 EXAM CompTIA Security+ m/ Product: Demo. For More Information:

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing.

PracticeDump. Free Practice Dumps - Unlimited Free Access of practice exam

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

0/41. Alice Who? Authentication Protocols. Andreas Zeller/Stephan Neuhaus. Lehrstuhl Softwaretechnik Universität des Saarlandes, Saarbrücken

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

Security Handshake Pitfalls

Understanding Cisco Cybersecurity Fundamentals

VII. Corente Services SSL Client

Password. authentication through passwords

Advanced Security Measures for Clients and Servers

Having learned basics of computer security and data security, in this section, you will learn how to develop secure systems.

Tennessee Technological University Policy No Password Management

Implementing Cisco Network Security (IINS) 3.0

EXAM - CAS-002. CompTIA Advanced Security Practitioner (CASP) Exam. Buy Full Product.

HikCentral V1.3 for Windows Hardening Guide

SonicOS Enhanced Release Notes

CompTIA Network+ Study Guide Table of Contents

Juniper Exam JN0-314 Junos Pulse Access Control, Specialist (JNCIS-AC) Version: 7.0 [ Total Questions: 222 ]

CSci 530 Final Exam. Fall 2007

IT Exam Training online / Bootcamp

Home Computer and Internet User Security

What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource.

CompTIA SY CompTIA Security+

Security and Authentication

CIS 4360 Introduction to Computer Security Fall WITH ANSWERS in bold. First Midterm

Service Managed Gateway TM. Configuring IPSec VPN

CS System Security 2nd-Half Semester Review

Security and Privacy. Xin Liu Computer Science University of California, Davis. Introduction 1-1


CompTIA A+ Certification ( ) Study Guide Table of Contents

JPexam. 最新の IT 認定試験資料のプロバイダ IT 認証であなたのキャリアを進めます

Checkpoint VPN-1 NG/FP3

Network Security and Cryptography. December Sample Exam Marking Scheme

Unit 5. System Security

CSCI 680: Computer & Network Security

Who are you? Enter userid and password. Means of Authentication. Authentication 2/19/2010 COMP Authentication is the process of verifying that

14. Internet Security (J. Kurose)

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

jk0-022 Exam Questions Demo CompTIA Exam Questions jk0-022

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

CSci530 Final Exam. Fall 2011

GCIH. GIAC Certified Incident Handler.

SonicOS Enhanced Release Notes

CompTIA Security+ (Exam SY0-401)

Computers and Security

ECCouncil Exam v9 Certified Ethical Hacker Exam V9 Version: 7.0 [ Total Questions: 125 ]

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

CompTIA Security+ (2008 Edition) Exam

Transcription:

s@lm@n Microsoft Exam 98-367 Security fundamentals Version: 9.0 [ Total Questions: 123 ]

Question No : 1 The Active Directory controls, enforces, and assigns security policies and access rights for all users. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct. A. NTFS permissions B. User Account Control C. Registry D. No change is needed Answer: D Question No : 2 E-mail bombing attacks a specific entity by: A. Redirecting all e-mail to another entity B. Sending high volumes of e-mail C. Tracing e-mail to the destination address D. Triggering high levels of security alerts Answer: B Explanation: In Internet usage, an email bomb is a form of net abuse consisting of sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted in a denial-of-service attack. Question No : 3 Which two characteristics should you recommend for a user's domain password? (Choose two.) A. Hard to guess 2

B. Includes Unicode characters C. Easy to remember D. Easy to increment Answer: A,C Reference: http://www.usewisdom.com/computer/passwords.html Question No : 4 Passwords that contain recognizable words are vulnerable to a: A. Denial of Service attack B. Hashing attack C. Dictionary attack D. Replay attack Answer: C Explanation: A dictionary attack is a method of breaking into a password-protected computer or server by systematically entering every word in a dictionary as a password. A dictionary attack can also be used in an attempt to find the key necessary to decrypt an encrypted message or document. Dictionary attacks work because many computer users and businesses insist on using ordinary words as passwords. Dictionary attacks are rarely successful against systems that employ multiple-word phrases, and unsuccessful against systems that employ random combinations of uppercase and lowercase letters mixed up with numerals. Reference: http://searchsecurity.techtarget.com/definition/dictionary-attack Question No : 5 This question requires that you evaluate the underlined text to determine if it is correct. The first line of defense against attacks from the Internet is a software firewall. 3

Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct. A. hardware firewall B. virus software C. radius server D. No change is needed Answer: A Question No : 6 HOTSPOT Alice sends her password to the game server in plaintext. Chuck is able to observe her password as shown in the following image: Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point. 4

Answer: Question No : 7 You are trying to establish communications between a client computer and a server. The server is not responding. You confirm that both the client and the server have network connectivity. Which should you check next? A. Microsoft Update B. Data Execution Prevention C. Windows Firewall D. Active Directory Domains and Trusts Answer: D Question No : 8 Which technology enables you to filter communications between a program and the Internet? 5

A. RADIUS server B. Antivirus software C. Software firewall D. BitLocker To Go Answer: C Explanation: There are two types of firewalls the Hardware Firewall and the Software Firewall. A Software Firewall is a software program and a Hardware Firewall is a piece of hardware. Both have the same objective of filtering communications over a system. Question No : 9 The primary method of authentication in an SSL connection is passwords. To answer, choose the option "No change is needed" if the underlined text is correct. If the underlined text is not correct, choose the correct answer. A. No change is needed B. Certificates C. IPsec D. Biometrics Answer: B Reference: https://www.geocerts.com/ssl/understanding_authentication Question No : 10 Keeping a server updated: A. Maximizes network efficiency B. Fixes security holes C. Speeds up folder access D. Synchronizes the server 6

Answer: B Question No : 11 Which of the following describes a VLAN? A. It connects multiple networks and routes data packets. B. It is a logical broadcast domain across physical subnets. C. It is a subnetwork that reveals a company's externally facing resources to the public network. D. It allows different network protocols to communicate between different network segments. Answer: B Explanation: VLAN (Virtual Local Network) is a logically separate IP subnetwork which allow multiple IP networks and subnets to exist on the same-switched network. VLAN is a logical broadcast domain that can span multiple physical LAN segments. It is a modern way administrators configure switches into virtual local-area networks (VLANs) to improve network performance by separating large Layer 2 broadcast domains into smaller ones. Question No : 12 You are an intern at Litware, Inc. Your manager asks you to make password guess attempts harder by limiting login attempts on company computers. What should you do? A. Enforce password sniffing. B. Enforce password history. C. Make password complexity requirements higher. D. Implement account lockout policy. Answer: D Reference: http://technet.microsoft.com/en-us/library/dd277400.aspx 7

Question No : 13 Shredding documents helps prevent: A. Man-in-the-middle attacks B. Social engineering C. File corruption D. Remote code execution E. Social networking Answer: B Reference: http://technet.microsoft.com/en-us/library/cc875841.aspx Question No : 14 HOTSPOT An employee where you work is unable to access the company message board in Internet Explorer. You review her Internet Options dialog box, as shown in the following image: 8

Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point. 9

Answer: Question No : 15 E-mail spoofing: A. Forwards e-mail messages to all contacts B. Copies e-mail messages sent from a specific user C. Obscures the true e-mail sender D. Modifies e-mail routing logs Answer: C Reference: http://www.microsoft.com/mscorp/safety/technologies/senderid/technology.mspx Question No : 16 Which attack listens to network traffic of a computer resource? 10