98-367 : Security Fundamentals : Part 05

  1. The certificate of a secure public Web server on the Internet should be:

    • Issued by a public certificate authority (CA)
    • Signed by using a 4096-bit key
    • Signed by using a 1024-bit key
    • Issued by an enterprise certificate authority (CA)
  2. Setting a minimum password age restricts when users can:

    • Request a password reset
    • Change their passwords
    • Log on by using their passwords
    • Set their own password expiration
    Explanation:
    Configure the minimum password age to be more than 0 if you want Enforce password history to be effective. Without a minimum password age, users can cycle through passwords repeatedly until they get to an old favorite.
  3. HOTSPOT

    For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

    98-367 Part 05 Q03 024 Question
    98-367 Part 05 Q03 024 Question
    98-367 Part 05 Q03 024 Answer
    98-367 Part 05 Q03 024 Answer
  4. Basic security questions used to reset a password are susceptible to:

    • Hashing
    • Social engineering
    • Network sniffing
    • Trojan horses
  5. You suspect a user’s computer is infected by a virus.

    What should you do first?

    • Restart the computer in safe mode
    • Replace the computer’s hard disk drive
    • Disconnect the computer from the network
    • Install antivirus software on the computer
  6. You create a new file in a folder that has inheritance enabled.

    By default, the new file:

    • Takes the permissions of the parent folder
    • Does not take any permissions
    • Takes the permissions of other folders in the same directory
    • Takes the permissions of other files in the same directory
  7. Password history policies are used to prevent:

    • Brute force attacks
    • Users from sharing passwords
    • Social engineering
    • Passwords from being reused immediately
    Explanation:
    This security setting determines the number of unique new passwords that have to be associated with a user account before an old password can be reused. The value must be between 0 and 24 passwords.
    This policy enables administrators to enhance security by ensuring that old passwords are not reused continually.
  8. HOTSPOT

    You are preparing an audit policy for the workstations at Contoso, Ltd. Currently, no advanced auditing is enabled. The workstations are not members of the domain.The settings of your Advanced Audit Policy Configuration are shown in the following image:

    98-367 Part 05 Q08 025
    98-367 Part 05 Q08 025

    Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.

    98-367 Part 05 Q08 026 Question
    98-367 Part 05 Q08 026 Question
    98-367 Part 05 Q08 026 Answer
    98-367 Part 05 Q08 026 Answer
  9. The Active Directory controls, enforces, and assigns security policies and access rights for all users.

    Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.

    • NTFS permissions
    • User Account Control
    • Registry
    • No change is needed
  10. Creating MD5 hash for files is an example of ensuring what?

    • Confidentiality
    • Availability
    • Least privilege
    • Integrity
    Explanation:
    The MD5 message-digest algorithm is a widely used cryptographic hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. MD5 has been utilized in a wide variety of cryptographic applications, and is also commonly used to verify data integrity.
  11. Which three elements does HTTPS encrypt? (Choose three.)

    • Browser cookies
    • Server IP address
    • Port numbers
    • Website URL
    • Login information
  12. The company that you work for wants to set up a secure network, but they do not have any servers.

    Which three security methods require the use of a server? (Choose three.)

    • 802.1x
    • WPA2 Personal
    • WPA2 Enterprise
    • RADIUS
    • 802.11ac
  13. Shredding documents helps prevent:

    • Man-in-the-middle attacks
    • Social engineering
    • File corruption
    • Remote code execution
    • Social networking
  14. Dumpster diving refers to a physical threat that a hacker might use to look for information about a computer network.

    Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.

    • Phishing
    • Malware
    • Reverse Social engineering
    • No change is needed
  15. An attorney hires you to increase the wireless network security for the law firm’s office. The office has a very basic network, with just a modem and a router.

    Which of these security modes offers the highest security?

    • WPA-Personal
    • WEP
    • WPA2-Personal
    • WPA-Enterprise
  16. HOTSPOT

    An employee where you work is unable to access the company message board in Internet Explorer.You review her Internet Options dialog box, as shown in the following image:

    98-367 Part 05 Q16 027
    98-367 Part 05 Q16 027

    Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.

    98-367 Part 05 Q16 028 Question
    98-367 Part 05 Q16 028 Question
    98-367 Part 05 Q16 028 Answer
    98-367 Part 05 Q16 028 Answer
  17. HOTSPOT

    For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

    98-367 Part 05 Q17 029 Question
    98-367 Part 05 Q17 029 Question
    98-367 Part 05 Q17 029 Answer
    98-367 Part 05 Q17 029 Answer
  18. HOTSPOT

    Alice and Bob are exchanging messages with each other. Chuck modifies the messages sent between Alice and Bob as shown in the following image:

    98-367 Part 05 Q18 030
    98-367 Part 05 Q18 030

    Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.

    98-367 Part 05 Q18 031 Question
    98-367 Part 05 Q18 031 Question
    98-367 Part 05 Q18 031 Answer
    98-367 Part 05 Q18 031 Answer

    Explanation:
    The usual way to prevent the man-in-the-middle attack is to use a public key cryptosystem capable of providing digital signatures. For set up, the parties must know each others public keys in advance. After the shared secret has been generated, the parties send digital signatures of it to each other. The man-in-the-middle can attempt to forge these signatures, but fails because he cannot fake the signatures.
  19. Which type of firewall allows for inspection of all characteristics of a packet?

    • NAT
    • Stateful
    • Stateless
    • Windows Defender
  20. HOTSPOT

    For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

    98-367 Part 05 Q20 032 Question
    98-367 Part 05 Q20 032 Question
    98-367 Part 05 Q20 032 Answer
    98-367 Part 05 Q20 032 Answer
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments