Exam Code: 98-367
Exam Name: MTA Security Fundamentals Practice Test
Passwords that contain recognizable words are vulnerable to a:
A. Denial of Service attack
B. Hashing attack
C. Dictionary attack
D. Replay attack
Correct Answer: C
A dictionary attack is a method of breaking into a password-protected computer 98-367 exam or server by systematically
entering every word in a dictionary as a password. A dictionary attack can also be used in an attempt to
find the key necessary to decrypt an encrypted message or document.
Dictionary attacks work because many computer users and businesses insist on using ordinary words as passwords. Dictionary attacks are rarely successful against systems that employ multiple-word phrases, and unsuccessful against systems that employ random combinations of uppercase and lowercase letters mixed up with numerals.
Account lockout 98-367 policies are used to prevent which type of security attack?
A. Brute force attacks
B. Users sharing passwords
C. Social engineering
D. Passwords being reused immediately
Correct Answer: A
What is the standard or basic collection of NTFS permissions?
A. Read and execute, read, write, full control, modify, list folder contents
B. Change permissions, read permissions, write permissions
C. Read attributes, list folder/read data, traverse folder/execute file
D. Create files/write data, create folders/append data, take ownership
Correct Answer: A
Which is the minimum requirement to 98-367 pdf create BitLocker-To-Go media on a client computer?
A. Windows XP Professional Service Pack 3
B. Windows Vista Enterprise Edition
C. Windows 7 Enterprise Edition
D. Windows 2000 Professional Service Pack 4
Correct Answer: A
What are three examples 98-367 of two-factor authentication? (Choose three.)
A. A fingerprint and a pattern
B. A password and a smart card
C. A username and a password
D. A password and a pin number
E. A pin number and a debit card
Correct Answer: ABE Explanation
At minimum two-factor authentication requires two out of 98-367 three regulatory-approved authentication
variables such as:
Something you know (like the PIN on your bank card or email password).
Something you have (the physical bank card or a authenticator token).
Something you are (biometrics like your finger print or iris pattern).
You need to limit the programs that can run on client computers to 98-367 vce a specific list. Which technology should you implement?
A. Windows Security Center
B. Security Accounts Manager
C. System Configuration Utility
D. AppLocker group policies
Correct Answer: A Explanation
The purpose of User Account Control (UAC) is to:
A. Encrypt the user’s account
B. Limit the privileges of software
C. Secure your data from corruption
D. Facilitate Internet filtering
Correct Answer: B
Explanation: User Account Control (UAC) is a technology and security infrastructure introduced with Microsoft’s Windows machines. It aims to improve the security of Microsoft 98-367 Windows by limiting application software to standard user privileges until an administrator authorizes an increase or elevation. In this way, only applications trusted by the user may receive administrative privileges, and malware should be kept from compromising the operating system.
What does implementing Windows Server Update 98-367 dumps Services (WSUS) allow a company to manage?
A. Shared private encryption key updates
B. Updates to Group Policy Objects
C. Active Directory server replication
D. Windows updates for workstations and servers
Correct Answer: D
Read more: http://www.exammoon.com/98-367.html