Exam Code: security fundamentals mta exam 98 367 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: MTA Security Fundamentals Practice Test
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass security fundamentals mta exam 98 367 Exam.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Microsoft 98-367 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 98-367 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/98-367-exam-dumps.html
Q41. Which of the following is a mechanism that allows authentication of dial-in and other network connections?
A. VPN
B. NTFS
C. RADIUS
D. Single Sign-On
Answer: C
Q42. You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008
network environment. The network is configured as a Windows Active Directory-based single forest
single domain network. You want to configure Network Access Protection (NAP) on your network.
You want that the clients connecting to the network must contain certain configurations. Which of
the following Windows components ensure that only clients having certain health benchmarks
access the network resources? Each correct answer represents a part of the solution. Choose two.
A. Windows Firewall
B. System Health Agents (SHA)
C. Terminal Service
D. System Health Validators (SHV)
E. TS Gateway
Answer: BD
Q43. You want to standardize security throughout your network. You primarily use Microsoft operating systems for servers and workstations. What is the best way to have standardized security (i.e. same password policies, lockout policies, etc.) throughout the network on clients and servers?
A. Publish the desired policies to all employees directing them to implement according to policy.
B. Configure each computer to adhere to the standard policies.
C. When installing new workstations or servers, image a machine that has proper security settings and install the new machine with that image.
D. Utilize Windows Security Templates for all computers.
Answer: D
Q44. Which of the following collects email addresses of users and creates a mailing list?
A. Browser
B. Cookie
C. Spambot
D. Perimeter network
Answer: C
Q45. All your domain controllers are configured for DHCP. Each time the system is booted, it gets a new IP address from the DHCP server. You had also configured the Active Directory on the domain controllers. You want to configure your DNS settings so that it will dynamically update DNS data whenever the IP address of a domain controller changes. How will you configure for dynamic updates?
A. Configure the DNS server for dynamic updates.
B. Configure the DHCP server for DNS dynamic updates.
C. Configure each domain controller for Dynamic update.
D. Configure the Active directory for dynamic updates.
Answer: B
Q46. Which of the following is an authentication protocol?
A. Kerberos
B. LDAP
C. TLS
D. PPTP
Answer: A
Q47. You work as a Network Administrator for TechMart Inc. The company has a Windows-based network. After completing a security audit of the company's Microsoft Windows Server 2008 R2 file servers, you have determined that folder and share security requires a revision on the basis of corporate reorganization. You have noticed that some shares on the file system are not secured. Which of the following is the default permission setting that you have used when a share is created?
A. Everyone with Change permission
B. Administrators with the Full Control permission
C. Administrators with the Change permission
D. Everyone with Read permission
Answer: D
Q48. Which of the following is the edge between the private and locally managed-and-owned side of a network and the public side that is commonly managed by a service provider?
A. Internet
B. Network perimeter
C. Intranet
D. VLAN
Answer: B
Q49. You are responsible for virus protection for a large college campus. You are very concerned that your antivirus solution must be able to capture the latest virus threats. What sort of virus protection should you implement?
A. Network Based
B. Host based
C. Dictionary
D. Heuristic
Answer: D
Q50. Mark works as a Security Officer for TechMart Inc. The company has a Windows-based network. He has bees assigned a project for ensuring the safety of the customer's money and information, not to mention the company's reputation. The company has gone through a security audit to ensure that it is in compliance with industry regulations and standards. Mark understands the request and has to do his due diligence for providing any information the regulators require as they are targeting potential security holes. In this situation, his major concern is the physical security of his company's system. Which of the following actions will Mark take to ensure the physical security of the company's desktop computers?
A. Call a team member while behaving to be someone else for gaining access to sensitive information.
B. Develop a social awareness of security threats within an organization.
C. Use group policies to disable the use of floppy drives or USB drives.
D. Provide protection against a Distributed Denial of Services attack.
Answer: C