Johnny's MTA Security

98 Questions | Attempts: 204
Please wait...
Question 1 / 99
🏆 Rank #--
Score 0/100

1. Question No : 87 Passwords that contain recognizable words are vulnerable to a:

Explanation

Dictionary attack

Submit
Please wait...
About This Quiz
Johnny

.

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. Question No : 1 Which attack listens to network traffic of a computer resource?

Explanation

Eavesdropping

Submit

3. Question No : 76 You create a new file in a folder that has inheritance enabled. By default, the new file:

Explanation

Takes the permissions of the parent folder

Submit

4. Question No : 43 Humongous Insurance needs to set up a domain controller in a branch office. Unfortunately, the server cannot be sufficiently secured from access by employees in that office, so the company is installing a Primary Domain Controller. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

Explanation

Read-Only Domain Controller

Submit

5. Question No : 2 The default password length for a Windows Server domain controller is:

Explanation

7

Submit

6. Question No : 47 You create a web server for your school. When users visit your site, they get a certificate error that says your site is not trusted. What should you do to fix this problem?

Explanation

Install a certificate from a trusted Certificate Authority (CA).

Submit

7. Question No : 10 Many Internet sites that you visit require a user name and password. How should you secure these passwords?

Explanation

Save them to an encrypted file

Submit

8. Question No : 6 A network sniffer is software or hardware that:

Explanation

Captures and analyzes network communication

Submit

9. Question No : 29 A user who receives a large number of emails selling prescription medicine is probably receiving pharming mail. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

Explanation

Spam

Submit

10. Question No : 32 The certificate of a secure public Web server on the Internet should be:

Explanation

Issued by a public certificate authority (CA)

Submit

11. Question No : 39 A digitally signed e-mail message:

Explanation

Validates the sender

Submit

12. Question No : 3 What does NAT do?

Explanation

It translates public IP addresses to private addresses and vice versa.

Submit

13. Question No : 18 What is a service set identifier (SSID)?

Explanation

The broadcast name of an access point

Submit

14. Question No : 12 You need to install a domain controller in a branch office. You also need to secure the information on the domain controller. You will be unable to physically secure the server. Which should you implement?

Explanation

Read-Only Domain Controller

Submit

15. Question No : 107 What does implementing Windows Server Update Services (WSUS) allow a company to manage?

Explanation

Windows updates for workstations and servers

Submit

16. Question No : 70 E-mail bombing attacks a specific entity by:

Explanation

Sending high volumes of e-mail

Submit

17. Question No : 54 To prevent users from copying data to removable media, you should:

Explanation

Apply a group policy

Submit

18. Question No : 72 The Windows Firewall protects computers from unauthorized network connections. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.

Explanation

No change is needed

Submit

19. Question No : 88 A brute force attack:

Explanation

Tries all possible password variations

Submit

20. Question No : 60 You need to prevent unauthorized users from reading a specific file on a portable computer if the portable computer is stolen. What should you implement?

Explanation

BitLocker

Submit

21. Question No : 42 Keeping a server updated:

Explanation

Fixes security holes

Submit

22. Question No : 102 Physically securing servers prevents

Explanation

Theft

Submit

23. Question No : 24 Cookies impact security by enabling: (Choose two.)

Explanation

Storage of Web site passwords., Web sites to track browsing habits.

Submit

24. Question No : 58 Which type of firewall allows for inspection of all characteristics of a packet?

Explanation

Stateful

Submit

25. Question No : 123 Which provides the highest level of security in a firewall?

Explanation

Stateful inspection

Submit

26. Question No : 11 Bridging is a process of sending packets from source to destination on OSI layer 3. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

Explanation

Routing

Submit

27. Question No : 15 To implement WPA2 Enterprise, you would need a/an:

Explanation

RADIUS server

Submit

28. Question No : 4 Role separation improves server security by:

Submit

29. Question No : 44 Phishing is an attempt to:

Explanation

Obtain information by posing as a trustworthy entity

Submit

30. Question No : 13 What are two attributes that an email message may contain that should cause a user to question whether the message is a phishing attempt? (Choose two.)

Explanation

Spelling and grammar errors , . Threats of losing service

Submit

31. Question No : 105 The client computers on your network are stable and do not need any new features. Which is a benefit of applying operating system updates to these clients?

Explanation

Close existing vulnerabilities

Submit

32. Question No : 112 What is the standard or basic collection of NTFS permissions?

Explanation

Read and execute, read, write, full control, modify, list folder contents

Submit

33. Question No : 8 Your password is 1Vu*cI!8sT. Which attack method is your password vulnerable to?

Explanation

Rainbow table

Submit

34. Question No : 49 Windows Server Update Services (WSUS) is a tool that:

Explanation

Manages updates for Microsoft software

Submit

35. Question No : 14 The WPA2 PreShared Key (PSK) is created by using a passphrase (password) and salting it with the WPS PIN. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

Explanation

Service Set Identifier (SSID)

Submit

36. Question No : 120 Where should you lock up the backup tapes for your servers?

Explanation

An offsite fire safe

Submit

37. Question No : 84 Shredding documents helps prevent:

Explanation

Social engineering

Submit

38. Question No : 94 An attorney hires you to increase the wireless network security for the law firm's office. The office has a very basic network, with just a modem and a router. Which of these security modes offers the highest security?

Explanation

WPA2-Personal

Submit

39. Question No : 9 A group of users has access to Folder A and all of its contents. You need to prevent some of the users from accessing a subfolder inside Folder A. What should you do first?

Explanation

Disable folder sharing

Submit

40. Question No : 5 The Graphic Design Institute hires you to help them set up a server for their 20-person team. As a general practice of hardening the server, you start by performing which two tasks? (Choose two.)

Explanation

A. Disable the guest account. . Rename the admin account

Submit

41. Question No : 116 You are trying to connect to an FTP server on the Internet from a computer in a school lab. You cannot get a connection. You try on another computer with the same results. The computers in the lab are able to browse the Internet. You are able to connect to this FTP server from home. What could be blocking the connection to the server?

Explanation

A firewall

Submit

42. Question No : 61 Basic security questions used to reset a password are susceptible to:

Explanation

Social engineering

Submit

43. Question No : 16 You are volunteering at an organization that gets a brand new web server. To make the server more secure, you should add a second administrator account. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

Explanation

Disable unused services

Submit

44. Question No : 104 E-mail spoofing:

Explanation

Obscures the true e-mail sender

Submit

45. Question No : 53 Which enables you to change the permissions on a folder?

Explanation

Modify

Submit

46. Question No : 23 Coho Winery wants to increase their web presence and hires you to set up a new web server. Coho already has servers for their business and would like to avoid purchasing a new one. Which server is best to use as a web server, considering the security and performance concerns?

Explanation

Domain Controller

Submit

47. Question No : 119 Which enables access to all of the logged-in user's capabilities on a computer?

Explanation

ActiveX controls

Submit

48. Question No : 68 What are three major attack vectors that a social engineering hacker may use? (Choose three.)

Explanation

Telephone, Reverse social engineering, Waste management

Submit

49. Question No : 89 The purpose of User Account Control (UAC) is to:

Explanation

Limit the privileges of software

Submit

50. Question No : 20 Which is the minimum requirement to create BitLocker-To-Go media on a client computer?

Explanation

Windows XP Professional Service Pack 3

Submit

51. Question No : 31 You want to make your computer resistant to online hackers and malicious software. What should you do?

Explanation

Install anti-virus software.

Submit

52. Question No : 75 The purpose of a digital certificate is to verify that a:

Explanation

Public key belongs to a sender.

Submit

53. Question No : 64 Network Access Protection (NAP) enables administrators to control access to network resources based on a computer's:

Explanation

Configuration

Submit

54. Question No : 81 You have two servers that run Windows Server. All drives on both servers are formatted by using NTFS. You move a file from one server to the other server. The file's permissions in the new location will:

Explanation

Inherit the destination folder's permissions

Submit

55. Question No : 97 You sign up for an online bank account. Every 6 months, the bank requires you to change your password. You have changed your password 5 times in the past. Instead of coming up with a new password, you decide to use one of your past passwords, but the bank's password history prevents you on doing so. Select the correct answer if the underlined text does not make the statement correct Select "No change is needed" if the underlined text makes the statement correct.

Explanation

No change is needed.

Submit

56. Question No : 22 Which two security settings can be controlled by using group policy? (Choose two.)

Explanation

Password complexity , Access to the Run... command

Submit

57. Question No : 59 You suspect a user's computer is infected by a virus. What should you do first?

Explanation

Install antivirus software on the computer

Submit

58. Question No : 74 Setting a minimum password age restricts when users can:

Explanation

Change their passwords

Submit

59. Question No : 66 Before you deploy Network Access Protection (NAP), you must install:

Explanation

Network Policy Server (NPS)

Submit

60. Question No : 46 What is an example of non-propagating malicious code?

Explanation

A back door

Submit

61. Question No : 17 Which two characteristics should you recommend for a user's domain password? (Choose two.)

Explanation

Hard to guess , Easy to remember

Submit

62. Question No : 26 Account lockout policies are used to prevent which type of security attack?

Explanation

Brute force attacks

Submit

63. Question No : 50 The purpose of Microsoft Baseline Security Analyzer is to:

Explanation

List system vulnerabilities

Submit

64.   Question No : 110 You are an intern at Litware, Inc. Your manager asks you to make password guess attempts harder by limiting login attempts on company computers. What should you do?

Explanation

Implement account lockout policy.

Submit

65. Question No : 33 The primary method of authentication in an SSL connection is passwords. To answer, choose the option "No change is needed" if the underlined text is correct. If the underlined text is not correct, choose the correct answer.

Explanation

Certificates

Submit

66. Question No : 77 Dumpster diving refers to a physical threat that a hacker might use to look for information about a computer network. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct

Explanation

No change is needed

Submit

67. Question No : 79 Your company requires that users type a series of characters to access the wireless network. The series of characters must meet the following requirements: ? Contains more than 15 characters ? Contains at least one letter ? Contains at least one number ? Contains at least one symbol Which security technology meets these requirements?

Explanation

WPA2 PSK

Submit

68. Question No : 65 A mail system administrator scans for viruses in incoming emails to increase the speed of mail processing. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

Explanation

Decrease the chances of a virus getting to a client machine

Submit

69. Question No : 35 What is a common method for password collection?

Explanation

Network sniffers

Submit

70. Question No : 40 To keep third-party content providers from tracking your movements on the web, enable InPrivate Browsing. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.

Explanation

InPrivate Filtering

Submit

71. Question No : 69 Password history policies are used to prevent:

Explanation

Passwords from being reused immediately

Submit

72.   Question No : 21 The Active Directory controls, enforces, and assigns security policies and access rights for all users. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

Explanation

No change is needed

Submit

73. Question No : 63 Which is a special folder permission?

Explanation

Delete

Submit

74. Question No : 101 Creating MD5 hash for files is an example of ensuring what?

Explanation

Integrity

Submit

75. Question No : 56 This question requires that you evaluate the underlined text to determine if it is correct. The first line of defense against attacks from the Internet is a software firewall. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.  

Explanation

hardware firewall

Submit

76. Question No : 25 To protect systems from buffer overflow errors, you can use:

Explanation

Data Execution Prevention

Submit

77. Question No : 80 The manager of a coffee shop hires you to securely set up WiFi in the shop. To keep computer users from seeing each other, what should you use with an access point?

Explanation

Client isolation mode

Submit

78. Question No : 78 You need to grant a set of users write access to a file on a network share. You should add the users to:

Explanation

The Authenticated Users group

Submit

79. Question No : 67 The company that you work for wants to set up a secure network, but they do not have any servers. Which three security methods require the use of a server? (Choose three.)

Explanation

802.1x, WPA2 Enterprise, RADIUS

Submit

80. Question No : 55 Which technology enables you to filter communications between a program and the Internet?

Explanation

Software firewall

Submit

81. Question No : 52 In Internet Explorer 8, the InPrivate Browsing feature prevents:

Explanation

Any session data from being stored on the computer.

Submit

82. Question No : 73 When conducting a security audit the first step is to:

Explanation

Inventory the company's technology assets

Submit

83. Microsoft 98-367 question 90

Explanation

Remote Assistance: Home/Work (Private)

Submit

84. Question No : 98 You have a Windows 7 desktop computer, and you create a Standard User account for your roommate so that he can use the desktop from time to time. Your roommate has forgotten his password. Which two actions can you take to reset the password? (Choose two.)

Explanation

Use your password reset disk. , Use your administrator account.

Submit

85. Question No : 115 How does the sender policy framework (SPF) aim to reduce spoofed email?

Explanation

It provides a list of IP address ranges for particular domains so senders can be verified.

Submit

86. Question No : 111 You would implement a wireless intrusion prevention system to:

Explanation

Prevent rogue wireless access points

Submit

87. Question No : 86 What are three examples of two-factor authentication? (Choose three.)

Explanation

A fingerprint and a pattern, A password and a smart card, A pin number and a debit card

Submit

88. Question No : 113 You are an intern at Wide World Importers and help manage 1000 workstations. All the workstations are members of an Active Domain. You need to push out an internal certificate to Internet Explorer on all workstations. What is the quickest method to do this?

Explanation

Local policy

Submit

89. Question No : 96 What is the primary advantage of using Active Directory Integrated Zones?

Explanation

Secure replication

Submit

90. Question No : 100 You need to limit the programs that can run on client computers to a specific list. Which technology should you implement?

Explanation

Windows Security Center

Submit

91. Question No : 71 Which two are included in an enterprise antivirus program? (Choose two.)

Explanation

On-demand scanning , Scheduled scanning

Submit

92. Question No : 118 Humongous Insurance is an online healthcare insurance company. During an annual security audit a security firm tests the strength of the company's password policy and suggests that Humongous Insurance implement password history policy. What is the likely reason that the security firm suggests this?

Explanation

Past passwords of users contained dictionary words.

Submit

93. Question No : 108 The primary purpose of Network Access Protection (NAP) is to prevent:

Explanation

Non-compliant systems from connecting to a network.

Submit

94. Question No : 103 Which of the following describes a VLAN?

Explanation

It is a logical broadcast domain across physical subnets.

Submit

95. Question No : 82 Which three elements does HTTPS encrypt? (Choose three.)

Explanation

Browser cookies, Website URL Login information

Submit

96. Question No : 99 Which password attack uses all possible alpha numeric combinations?

Explanation

Dictionary attack

Submit

97. Question No : 109 You are trying to establish communications between a client computer and a server. The server is not responding. You confirm that both the client and the server have network connectivity. Which should you check next ?

Explanation

Active Directory Domains and Trusts

Submit

98. Question No : 37 You are an intern and are working remotely. You need a solution that meets the following requirements: ? Allows you to access data on the company network securely ? Gives you the same privileges and access as if you were in the office What are two connection methods you could use? (Choose two

Explanation

Forward Proxy Roaming Profiles

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (98)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Question No : 87 ...
Question No : 1 ...
Question No : 76 ...
Question No : 43 ...
Question No : 2 ...
Question No : 47 ...
Question No : 10 ...
Question No : 6 A network sniffer is software or hardware that:
Question No : 29 ...
Question No : 32 ...
Question No : 39 A digitally signed e-mail message:
Question No : 3 What does NAT do?
Question No : 18 What is a service set identifier (SSID)?
Question No : 12 ...
Question No : 107 ...
Question No : 70 E-mail bombing attacks a specific entity by:
Question No : 54 ...
Question No : 72 ...
Question No : 88 A brute force attack:
Question No : 60 ...
Question No : 42 Keeping a server updated:
Question No : 102 Physically securing servers prevents
Question No : 24 ...
Question No : 58 ...
Question No : 123 ...
Question No : 11 ...
Question No : 15 ...
Question No : 4 Role separation improves server security by:
Question No : 44 Phishing is an attempt to:
Question No : 13 ...
Question No : 105 ...
Question No : 112 ...
Question No : 8 ...
Question No : 49 ...
Question No : 14 ...
Question No : 120 ...
Question No : 84 Shredding documents helps prevent:
Question No : 94 ...
Question No : 9 ...
Question No : 5 ...
Question No : 116 ...
Question No : 61 ...
Question No : 16 ...
Question No : 104 E-mail spoofing:
Question No : 53 ...
Question No : 23 ...
Question No : 119 ...
Question No : 68 ...
Question No : 89 The purpose of User Account Control (UAC) is to:
Question No : 20 ...
Question No : 31 ...
Question No : 75 ...
Question No : 64 ...
Question No : 81 ...
Question No : 97 ...
Question No : 22 ...
Question No : 59 ...
Question No : 74 ...
Question No : 66 ...
Question No : 46 ...
Question No : 17 ...
Question No : 26 ...
Question No : 50 ...
  ...
Question No : 33 ...
Question No : 77 ...
Question No : 79 ...
Question No : 65 ...
Question No : 35 What is a common method for password collection?
Question No : 40 ...
Question No : 69 Password history policies are used to prevent:
  ...
Question No : 63 Which is a special folder permission?
Question No : 101 ...
Question No : 56 ...
Question No : 25 ...
Question No : 80 ...
Question No : 78 ...
Question No : 67 ...
Question No : 55 ...
Question No : 52 ...
Question No : 73 ...
Question No : 98 ...
Question No : 115 ...
Question No : 111 ...
Question No : 86 ...
Question No : 113 ...
Question No : 96 ...
Question No : 100 ...
Question No : 71 ...
Question No : 118 ...
Question No : 108 ...
Question No : 103 Which of the following describes a VLAN?
Question No : 82 ...
Question No : 99 ...
Question No : 109 ...
Question No : 37 ...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!