PrepAway - Latest Free Exam Questions & Answers

Category: 98-367

Exam 98-367: Security Fundamentals

Which of the following will Mark use to attract theattackers for understanding their methods?

Mark work as a System Administrator for TechMart Inc. The company has a Windows-based network.
Mark wants to allow the remote travel agents to be able to access the corporate network so that they are free to check email and post appointments that are booked for the particular day.
Mark has decided to permit the travel agents to usetheir home computers but he is required to be assured that the information is not compromised by anyone because the security of client information is on the top priority for him. Mark is concerned about probable attackers will be able to penetrate the VPN.
Which of the following will Mark use to attract theattackers for understanding their methods?

Which of the following actions will Mark take to configure Internet zone feature in IE 8 and to enableusers

Mark works as a Desktop Administrator for TechMart Inc. The company has a Windows-based network.
He has bees assigned a project to upgrade the browsers to Internet Explorer (IE) 8 for working with the latest Internet technologies Mark wants to ensure that thecompany uses a number of the security features built into the browser while maintaining functionality within the company’s intranet. Mark is also educating his users to be good Internet citizens and use the safe web surfing.
Which of the following actions will Mark take to configure Internet zone feature in IE 8 and to enableusers to easily browse the local intranet without disturbingthe security levels?

What must you do to provide SPI to your mobile users?

The workstations on your network utilize Windows XP(service pack 2 or later). Many users take their laptops on the road. You are very concerned about the security and want to have a robust firewall solution for mobile users. You have decided that all your firewalls to use the Stateful Packet Inspection (SPI) method.
What must you do to provide SPI to your mobile users?

Which of the following is the default permission setting that you have used when a share is created?

You work as a Network Administrator for TechMart Inc. The company has a Windows-based network.
After completing a security audit of the company’s Microsoft Windows Server 2008 R2 file servers, you have determined that folder and share security requires a revision on the basis of corporate reorganization.
You have noticed that some shares on the file system are not secured. Which of the following is the default permission setting that you have used when a share is created?


Page 15 of 16« First...1213141516