Master the mta 98 367 MTA Security Fundamentals Practice Test content and be ready for exam day success quickly with this Testking mta exam 98 367 exam engine. We guarantee it!We make it a reality and give you real mta exam 98 367 questions in our Microsoft mta 98 367 braindumps.Latest 100% VALID Microsoft security fundamentals mta exam 98 367 Exam Questions Dumps at below page. You can use our Microsoft mta exam 98 367 braindumps and pass your exam.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Microsoft 98-367 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 98-367 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/98-367-exam-dumps.html
Q51. Which of the following uses a symmetric encryption algorithm that takes a lesser amount of time to encrypt or decrypt large amounts of data.
A. BitLocker
B. SSID
C. BitLocker To Go
D. EFS
Answer: D
Q52. Mark works as a Security Officer for TechMart Inc. The company has a Windows-based network. He has bees assigned a project for ensuring the safety of the customer's money and information, not to mention the company's reputation. The company has gone through a security audit to ensure that it is in compliance with industry regulations and standards. Mark understands the request and has to do his due diligence for providing any information the regulators require as they are targeting potential security holes. In this situation, his major concern is the physical security of his company's system. Which of the following actions will Mark take to prevent the use of key loggers in the company?
A. Provide protection against a Distributed Denial of Services attack.
B. Call a team member while behaving to be someone else for gaining access to sensitive information.
C. Ensure that the terminals are locked and perform a regular inspection of the ports on the systems.
D. Develop a social awareness of security threats within an organization.
Answer: C
Q53. You work as a Network Administrator for Tech Perfect Inc. The company has a Windows 2008 Active Directory-based network. All client computers on the network run Windows Vista Ultimate. You have configured a Dynamic DNS (DDNS) on the network. There are a lot of mobile users who often connect to and disconnect from the network. Users on the network complain of slow network responses. You suspect that the stale records on the DNS server may be the cause of the issue. You want to remove the stale records.Which of the following technologies will you use to accomplish the task?
A. RODC
B. Aging
C. Scavenging
D. Forwarding
Answer: C
Q54. Which of the following is a technique used to attack an Ethernet wired or wireless network?
A. ARP poisoning
B. DNS poisoning
C. Mail bombing
D. Keystroke logging
Answer: A
Q55. Which of the following is the layer in which encryption and decryption of data takes place?
A. Presentation layer
B. Session layer
C. Physical layer
D. Data-link layer
Answer: A
Q56. Which of the following ports is used by the IMAP4 protocol?
A. 443
B. 53
C. 143
D. 110
Answer: C
Q57. Which of the following is a disadvantage of using biometric identification?
A. It breaks the several firewall security rules.
B. It needs a new network configuration of the entire infrastructure.
C. It can be faked and will not be trusted by several organizations.
D. It is expensive and cannot be afforded by several organizations
Answer: D
Q58. Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?
A. Static NAT
B. Port Address Translation (PAT)
C. Dynamic NAT
D. Cache NAT
Answer: C
Q59. Which of the following are the features of security level in the Restricted Sites zone
A. The protection against harmful content is provided.
B. The maximum safeguards are used.
C. Most of the features are disabled.
D. The default security level is low.
Answer: ABC
Q60. Which of the following are indications of a virus attack on a computer? Each correct answer represents a complete solution. Choose three.
A. Although the computer has sufficient memory, an out-of-memory error message is displayed.
B. The applications installed on the computer system work properly.
C. An antivirus program is not able to run.
D. The computer runs slower than usual and stops responding.
Answer: ACD