Today Big Q: security fundamentals mta exam 98 367?

Examcollection security fundamentals mta exam 98 367 Questions are updated and all security fundamentals mta exam 98 367 answers are verified by experts. Once you have completely prepared with our security fundamentals mta exam 98 367 exam prep kits you will be ready for the real mta exam 98 367 exam without a problem. We have Down to date Microsoft mta exam 98 367 dumps study guide. PASSED mta exam 98 367 First attempt! Here What I Did.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 98-367 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 98-367 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/98-367-exam-dumps.html

Q21. Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network has a Windows Server 2008 member server that works as a Routing and Remote Access Server (RRAS). Mark implements Network Access Protection (NAP) for the network. Mark wants to configure Point-to-Point Protocol (PPP) authentication on the RRAS server. Which of the following authentication methods should Mark use to accomplish this task? 

A. EAP 

B. CHAP 

C. SPAP 

D. PAP 

Answer:


Q22. Which of the following is a broadcast domain created by a switch? 

A. VLAN 

B. MAN 

C. DMZ 

D. VPN 

Answer:


Q23. The stronger password is a critical element in the security plan. Which of the following are the characteristics used to make up a strong password? 

A. It contains more than seven hundred characters and does not contain the user name, real name, or any name that can be guessed by the attacker easily. 

B. It contains more than seven characters and does not contain the user name, real name, or anyname that can be guessed by the attacker easily. 

C. It contains the user name, real name, or any name that can be remembered easily and does not contain more than seven characters. 

D. It contains more than seven characters and the user name, real name, or any name. 

Answer:


Q24. Which of the following contains a tree of domain names? 

A. Domain name space 

B. Domain name formulation 

C. Domain Name System 

D. Authoritative name server 

Answer:


Q25. Which of the following can be implemented to decrease the number of times a user is required to be authenticated for access a particular resource? 

A. TCP/IP protocol 

B. Network Directory Access Protocol 

C. Kerberos 

D. Single Sign-on (SSO) 

Answer:


Q26. You work as a security manager for Company Inc. An individual is connecting to your corporate internal network over the Internet. You have to ensure that he is not an intruder masquerading as an authorized user. Which of the following technologies will you use to accomplish the task? 

A. Two-factor authentication 

B. IP address packet filtering 

C. Intrusion detection system (IDS) 

D. Embedded digital signature 

Answer:


Q27. Which of the following security features of IE 7+ helps determine whether a Web site is a legitimate site? 

A. Protected mode

B. Pop-up blocker 

C. Security zones 

D. Phishing filter 

Answer:


Q28. Which of the following is a method of capturing and recording computer users' keystrokes including sensitive passwords? 

A. Using hardware keyloggers 

B. Using Alchemy Remote Executor 

C. Using SocketShield 

D. Using Anti-virus software 

Answer:


Q29. Which of the following ports is used by the Remote Desktop Protocol? 

A. 80 

B. 23 

C. 3389 

D. 110 

Answer:


Q30. Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to implement a method to ensure that the mobile devices are in a good state of security health when they are trying to access the corporate network. For this purpose, Mark is using NAP. Which of the following will he do for those computers in the network that are not compatible with NAP? 

A. Define exceptions in NAP for computers that are not compatible with NAP. 

B. Hide those computers that are not compatible with NAP. 

C. Remove those computers that are not compatible with NAP. 

D. Do not use the NAP, if any of the computers is showing incompatibility in the entire network. 

Answer: