MTA 98-367: Security Fundamentals

Ace your homework & exams now with Quizwiz!

To implement multifactor authentication you should :

A smart card and a pin

What is the primary purpose of a firewall?

To protect the network by restricting incoming and outgoing network traffic.

Which are common symptoms of a virus infection? (2 answers)

1. New icons appear spontaneously on the desktop. 2. An installed antivirus program is disabled and will not restart.

You want to provide public access to a Web Server. Visitors to the Web Server should not have access to your internal network. You need to configure what?

A perimeter network. (Basically a DMZ)

Your Active Directory domain's network computers access the Internet through a Network Address Translation (NAT) server deployed on a perimeter network. You need to ensure that the same Internet Explorer (IE) browser security policies are used by tall clients. What should you do?

Create a domain-level Group Policy (GPO).

Which is used to validate DNSsec responses?

Digital signature

You are a network administrator. You need to minimize the attack surface for your network. What would this involve?

Ensuring that only required features are enabled.

Which represents a security threat to your DNS environment?

Footprinting, the process of maliciously gaining info about domains.

Microsoft Security Baseline Analyzer (MSBA) is used to?

Identify security misconfigurations and missing security updates on network computers.

You have a wireless network. You need to ensure that only specific client computers are able to access the wireless network. What should you do?

Implement MAC filtering.

Which type of security service is concerned with preventing or detecting any tampering with data?

Integrity.

What is the advantage of preventing a wireless access point (WAP) from broadcasting its Service Set Identifier (SSID)?

It prevents the WAP from appearing in the list of available wireless networks.

Which authentication protocol uses time-stamped tickets to minimize the likelihood of replay attacks?

Kerberos

Which protocol is used for smart card interactive logon to the local WIndows Active Directory domain?

Kerberos

Which type of certification authority (CA) issues its own certificates?

Root CA.

What will happen when you move a file you encrypted through the encrypting file system (EFS) to an unencrypted folder on an NTFS partition?

The file remains encrypted.

Which is the role of Health Registration Authority (HRA) in Network Access Protection (NAP)?

Validating and requesting a health certificate for compliant clients.

Which wireless security method uses Temporary Key Integrity Protocol (TKIP) encryption?

WPA uses and requires TKIP.

You want to ensure that mobile clients receive timely operating system updates. Some clients rarely connect to the internal business network. Which should you use?

Windows Update Agent (WUA).

Network Access Protection (NAP) is able to check the status of?

Windows updates, firewall protection, spyware protection, and antivirus protection.

Malicious software that masquerades as a beneficial utility is known as?

a trojan horse.

SYSKEY improves physical security by requiring a password or special floppy disk to?

boot the server.

A computer that is designed to entice hackers to attack it is known as a?

honeyspot


Related study sets

Science: Habitats of Plants & Animals

View Set

30-Hr. TX Law of Promulgated Contracts Course

View Set

10.¿QUÉ HACES TODOS LOS DÍAS?

View Set

Money and Banking (Ch. 15 and 16)

View Set

CompTIA Security+ Cert Prep 2: Secure Code Design and Implementation

View Set

CHAPT 25 - Health Promotion for the 21st Century

View Set

Chap 24.1 Functions of the Digestive System

View Set