PrepAway - Latest Free Exam Questions & Answers

Category: 98-367 (v.2)

Exam 98-367: Security Fundamentals (update January 25th, 2016)

What will Mark do to accomplish the task?

Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008
domain-based network. The network uses Network Access Protection (NAP). The company’s
employees at the remote locations are connecting to the company’s network from their Windows
Vista clients. Mark wants to ensure that the data transmission between a client computer and the
company’s network is as secure as possible. What will Mark do to accomplish the task?

Which of the following is a potential risk if the travel agents will use their home computers for VPN access?

Mark work as a System Administrator for TechMart Inc. The company has a Windows-based
network. Mark wants to allow the remote travel agents to be able to access the corporate network
so that they are free to check email and post appointments that are booked for the particular day.
Mark has decided to permit the travel agents to use their home computers but he is required to be
assured that the information is not compromised by anyone because the security of client
information is on the top priority for him. Which of the following is a potential risk if the travel
agents will use their home computers for VPN access?

Which of the following actions will Mark take to prevent the use of key loggers in the company?

Mark works as a Security Officer for TechMart Inc. The company has a Windows-based network. He
has bees assigned a project for ensuring the safety of the customer’s money and information, not to
mention the company’s reputation. The company has gone through a security audit to ensure that it
is in compliance with industry regulations and standards. Mark understands the request and has to
do his due diligence for providing any information the regulators require as they are targeting
potential security holes. In this situation, his major concern is the physical security of his company’s
system. Which of the following actions will Mark take to prevent the use of key loggers in the
company?


Page 10 of 16« First...89101112...Last »