Advanced Guide: security fundamentals mta exam 98 367

Want to know Testking mta 98 367 Exam practice test features? Want to lear more about Microsoft MTA Security Fundamentals Practice Test certification experience? Study Breathing Microsoft mta 98 367 answers to Replace security fundamentals mta exam 98 367 questions at Testking. Gat a success with an absolute guarantee to pass Microsoft mta 98 367 (MTA Security Fundamentals Practice Test) test on your first attempt.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 98-367 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 98-367 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/98-367-exam-dumps.html

Q61. Mark works as a Network Administrator for BlueWell Inc. The company has a Windows-based network. Mark has retained his services to perform a security assessment of the company's network that has various servers exposed to the Internet. So, it may be vulnerable to an attack. Mark is using a single perimeter ?rewall, but he does not know if that is enough. He wants to review the situation and make some reliable recommendations so that he can protect the data over company's network. Which of the following will Mark do to accomplish the task? 

A. Outsource the related services. 

B. Encrypt the data and than start transmission. 

C. Locate the Internet-exposed servers and devices in an internal network. 

D. Create a perimeter network to isolate the servers from the internal network. 

Answer:


Q62. Which of the following is a process in which data is changed before or while it is entered into a computer system? 

A. Data diddling 

B. Authentication 

C. Domain kiting 

D. Packet sniffing 

Answer:


Q63. Which of the following protects against unauthorized access to confidential information via encryption and works at the network layer?

A. Firewall

B. NAT 

C. IPSec 

D. MAC address 

Answer:


Q64. Which of the following is the process of keeping track of a user's activity while accessing network resources? 

A. Authentication 

B. Auditing 

C. Spoofing 

D. Biometrics 

Answer:


Q65. Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to implement stronger authentication measures for the customers, as well as eliminate IT staff from logging on with high privileges. Mark has various options, but he is required to keep the processes easy for the helpdesk staff. Which of the following is a service can the staff uses as an alternative of signing in with elevate privileges? 

A. Secondary Logon-Run As 

B. Security log 

C. Hardware firewall 

D. Encrypted network configuration 

Answer:


Q66. Which of the following security features of IE 7+ makes it more difficult for malware to be installed? 

A. Security zones 

B. Phishing filter 

C. Protected mode 

D. Pop-up blocker 

Answer:


Q67. Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. Mark configures Network Access Protection (NAP) on the network. He then configures secure wireless access to the network from all access points on the network. He also configures 802.1x authentication for accessing the network. Mark wants to ensure that all computers connecting to the network are checked by NAP for the required configuration and update status. What will Mark do to accomplish the task? 

A. Configure all computers connecting to the network with IPSec. 

B. Configure all access points as RADIUS clients to Distributed File System. 

C. Configure Link-local Multicast Name Resolution (LLMNR) on the network. 

D. Configure all access points as RADIUS clients to Network Policy Server (NPS). 

Answer:


Q68. On which of the following is the level of security set for an Internet zone applied? 

A. To the sites that you have specifically indicated as the ones that you trust. 

B. To all the Websites by default. 

C. To the sites that might potentially damage your computer, or your information. 

D. To the Websites and content that are stored on a corporate or business network. 

Answer:


Q69. Which of the following is a security protocol that is used to protect data from being modified, corrupted, or accessed without authorization?

A. Honeypot

B. IP Security (IPsec)

C. DNSSEC

D. Protocol spoofing

Answer: B


Q70. You check the logs on several clients and find that there is traffic coming in on an odd port (port 1872). All clients have the Windows XP firewall turned on. What should you do to block this unwanted traffic? 

A. Perform a virus scan to find the virus responsible for this traffic. 

B. Check the exceptions in the firewall and unselect that port exception. 

C. Trace back that traffic and find its origin. 

D. Shut down the service that connects to that port. 

Answer: