mta exam 98 367 : Nov 2021 Edition

Testking offers free demo for mta exam 98 367 exam. "MTA Security Fundamentals Practice Test", also known as mta exam 98 367 exam, is a Microsoft Certification. This set of posts, Passing the Microsoft mta 98 367 exam, will help you answer those questions. The mta exam 98 367 Questions & Answers covers all the knowledge points of the real exam. 100% real Microsoft mta exam 98 367 exams and revised by experts!


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 98-367 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 98-367 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/98-367-exam-dumps.html

Q1. The workstations on your network utilize Windows XP (service pack 2 or later). Many users take their laptops on the road. You are very concerned about the security and want to have a robust firewall solution for mobile users. You have decided that all your firewalls to use the Stateful Packet Inspection (SPI) method. What must you do to provide SPI to your mobile users? 

A. You must purchase a third party firewall solution for your mobile users. 

B. Do nothing. Windows XP service pack 2 has a firewall turned on by default. 

C. Configure the Windows XP firewall to use SPI. 

D. Download the SPI template from Microsoft. 

Answer:


Q2. Which of the following is defined as a digitally signed statement used to authenticate and to secure information on open networks? 

A. Kerberos 

B. Public certificate 

C. Single sign-on (SSO) 

D. SEAL 

Answer:


Q3. You work as a Network Administrator for SpyNet Inc. The company has a Windows-based network. You have been assigned the task of auditing the scheduled network security. After a regular audition, you suspect that the company is under attack by an intruder trying to gain access to the company's network resources. While analyzing the log files, you find that the IP address of the intruder belongs to a trusted partner company. Assuming this situation, which of the following attacks is the company being subjected to? 

A. Spoofing 

B. Man-in-the-middle 

C. CookieMonster 

D. Phreaking 

Answer:


Q4. Which of the following is a secret numeric password shared between a user and a system for authenticating the user to the system? 

A. PIN 

B. Private key 

C. Key escrow 

D. Public key 

Answer:


Q5. Which of the following MMC snap-in consoles is used to administer domain and forest functional levels and user principal name (UPN) suffixes? 

A. Group Policy Management Console 

B. Active Directory Domains and Trusts 

C. Active Directory Sites and Services 

D. Active Directory Administrative Center 

Answer:


Q6. Which of the following are required to enable for preventing the users from downloading and installing software from the Internet? Each correct answer represents a complete solution. Choose all that apply. 

A. Software restriction policies 

B. PTR record 

C. User Account Control 

D. Anti-Virus software 

Answer: AC


Q7. Which of the following is a name that identifies a particular 802.11 wireless LAN?

A. MBSA

B. IBSS

C. MAC

D. SSID

Answer: D


Q8. A user has opened a Web site that automatically starts downloading malicious code onto his computer. What should he do to prevent this? Each correct answer represents a complete solution. Choose two.

A. Disable ActiveX Controls

B. Disable Active Scripting

C. Implement File Integrity Auditing

D. Configure Security Logs

Answer: AB


Q9. Mark works as a Security Administrator for TechMart Inc. The company has a a Windows-based network. Mark has gone through a security audit for ensuring that the technical system is secure and protected. While this audit, he identified many areas that need improvement. He wants to minimize the risk for potential security threats by educating team members in the area of social engineering, and providing basic security principle knowledge while stressing the Con?dentiality, Integrity, and Availability triangle in the training of his team members . Which of the following ways will Mark use for educating his team members on the social engineering process? 

A. He will call a team member while behaving to be someone else for gaining access to sensitive information. 

B. He will use group policies to disable the use of floppy drives or USB drives. 

C. He will develop a social awareness of security threats within an organization. 

D. He will protect against a Distributed Denial of Services attack. 

Answer:


Q10. Which of the following types of viruses protects itself from antivirus programs and is more difficult to trace? 

A. Armored virus 

B. MBR virus 

C. Boot sector virus 

D. Macro virus 

Answer: