getcertified4sure.com

The Only Tip You Need: mta 98 367




Your success in Microsoft mta 98 367 is our sole target and we develop all our security fundamentals mta exam 98 367 braindumps in a way that facilitates the attainment of this target. Not only is our security fundamentals mta exam 98 367 study material the best you can find, it is also the most detailed and the most updated. security fundamentals mta exam 98 367 Practice Exams for Microsoft MTA security fundamentals mta exam 98 367 are written to the highest standards of technical accuracy.

Q51. Which of the following are indications of a virus attack on a computer? Each correct answer represents a complete solution. Choose three. 

A. Although the computer has sufficient memory, an out-of-memory error message is displayed. 

B. The applications installed on the computer system work properly. 

C. An antivirus program is not able to run. 

D. The computer runs slower than usual and stops responding. 

Answer: ACD 


Q52. Which of the following layers defines the mechanisms that allow data to be passed from one network to another? 

A. Network layer 

B. Session layer 

C. Physical layer 

D. Data-link layer 

Answer:


Q53. Mark works as a Desktop Administrator for TechMart Inc. The company has a Windows-based network. He has bees assigned a project to upgrade the browsers to Internet Explorer (IE) 8 for working with the latest Internet technologies Mark wants to ensure that the company uses a number of the security features built into the browser while maintaining functionality within the company's intranet. Mark is also educating his users to be good Internet citizens and use the safe web sur?ng. Which of the following actions will Mark take to configure Internet zone feature in IE 8 and to enable users to easily browse the local intranet without disturbing the security levels? 

A. Develop a social awareness of security threats within an organization. 

B. Call a team member while behaving to be someone else for gaining access to sensitive information. 

C. Provide protection against a Distributed Denial of Services attack. 

D. Go into the Internet Options, select the Security, and add the intranet site to the list of Local Intranet Site. 

Answer:


Q54. Which of the following viruses cannot be detected by the signature-based antivirus? 

A. Polymorphic 

B. MBR virus 

C. Boot sector 

D. Macro 

Answer:


Q55. Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. Mark configures Network Access Protection (NAP) on the network. He then configures secure wireless access to the network from all access points on the network. He also configures 802.1x authentication for accessing the network. Mark wants to ensure that all computers connecting to the network are checked by NAP for the required configuration and update status. What will Mark do to accomplish the task? 

A. Configure all computers connecting to the network with IPSec. 

B. Configure all access points as RADIUS clients to Distributed File System. 

C. Configure Link-local Multicast Name Resolution (LLMNR) on the network. 

D. Configure all access points as RADIUS clients to Network Policy Server (NPS). 

Answer:


Q56. Which of the following can be used to implement two-factor authentications? Each correct answer represents a complete solution. Choose all that apply. 

A. Firewall security rule 

B. Password 

C. Smart card 

D. Encrypted network configuration 

Answer: BC 


Q57. Which of the following security features of IE 7+ helps determine whether a Web site is a legitimate site? 

A. Protected mode

B. Pop-up blocker 

C. Security zones 

D. Phishing filter 

Answer:


Q58. Which of the following root keys stores information about registered applications? 

A. HKEY_USERS 

B. HKEY_CLASSES_ROOT 

C. HKEY_CURRENT_CONFIG 

D. HKEY_CURRENT_USER 

Answer:


Q59. Which of the following states that a user should never be given more privileges than are required to

carry out a task?

A. Security through obscurity

B. Segregation of duties

C. Principle of least privilege

D. Role-based security

Answer:


Q60. Which of the following is the layer in which encryption and decryption of data takes place? 

A. Presentation layer

B. Session layer 

C. Physical layer 

D. Data-link layer 

Answer: