PrepAway - Latest Free Exam Questions & Answers

Category: 98-367 (v.1)

Exam 98-367: Security Fundamentals (update January 5th, 2015)

Mark is using a single perimeter ?

Mark works as a Network Administrator for BlueWell Inc. The company has a Windows-based
network. Mark has retained his services to perform a security assessment of the company’s network
that has various servers exposed to the Internet. So, it may be vulnerable to an attack. Mark is using
a single perimeter ?rewall, but he does not know if that is enough. He wants to review the situation
and make some reliable recommendations so that he can protect the data over company’s network.
Which of the following will Mark use to inspect network information on the basis of source and
destination address?

Which of the following will Mark use to attract the attackers for understanding their methods?

Mark work as a System Administrator for TechMart Inc. The company has a Windows-based
network. Mark wants to allow the remote travel agents to be able to access the corporate network
so that they are free to check email and post appointments that are booked for the particular day.
Mark has decided to permit the travel agents to use their home computers but he is required to be
assured that the information is not compromised by anyone because the security of client
information is on the top priority for him. Mark is concerned about probable attackers will be able to
penetrate the VPN. Which of the following will Mark use to attract the attackers for understanding
their methods?

Mark is also educating his users to be good Internet citizens and use the safe web sur?

Mark works as a Desktop Administrator for TechMart Inc. The company has a Windows-based
network. He has bees assigned a project to upgrade the browsers to Internet Explorer (IE) 8 for
working with the latest Internet technologies Mark wants to ensure that the company uses a
number of the security features built into the browser while maintaining functionality within the
company’s intranet. Mark is also educating his users to be good Internet citizens and use the safe
web sur?ng. Which of the following actions will Mark take to configure Internet zone feature in IE 8
and to enable users to easily browse the local intranet without disturbing the security levels?

What must you do to provide SPI to your mobile users?

The workstations on your network utilize Windows XP (service pack 2 or later). Many users take their
laptops on the road. You are very concerned about the security and want to have a robust firewall
solution for mobile users. You have decided that all your firewalls to use the Stateful Packet
Inspection (SPI) method. What must you do to provide SPI to your mobile users?

Which of the following is the default permission setting that you have used when a share is created?

You work as a Network Administrator for TechMart Inc. The company has a Windows-based
network. After completing a security audit of the company’s Microsoft Windows Server 2008 R2 file
servers, you have determined that folder and share security requires a revision on the basis of
corporate reorganization. You have noticed that some shares on the file system are not secured.
Which of the following is the default permission setting that you have used when a share is created?

What is the best solution for you to implement?

You work as a Network Administrator for a medium sized business. Spam has become a significant
problem for your company. You want to have a common network wide solution. You want a solution
that is easy to administer. However, you do not want your solution to hinder the performance of
your email server. What is the best solution for you to implement?


Page 15 of 16« First...1213141516