getcertified4sure.com

mta exam 98 367? Tips for success




Want to know Exambible mta exam 98 367 Exam practice test features? Want to lear more about Microsoft MTA Security Fundamentals Practice Test certification experience? Study Best Quality Microsoft mta 98 367 answers to Improved security fundamentals mta exam 98 367 questions at Exambible. Gat a success with an absolute guarantee to pass Microsoft security fundamentals mta exam 98 367 (MTA Security Fundamentals Practice Test) test on your first attempt.

Q61. Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network. The company is adding an open, high-speed, wireless access for their customers and secured wireless for employees at all 37 branches. He wants to check the various security concerns for ensuring that business traffic is secured. He is also under pressure to make this new feature a winning strategy for a company. 

In which of the following ways can Mark add another level of security after implanting encryption techniques for the business wireless traffic? Each correct answer represents a complete solution. Choose all that apply. 

A. Hide the Service Set Identifier (SSID) 

B. Configure the network to use only Extensible Authentication Protocol (EAP) 

C. Implement access point isolation and 

D. Use MAC filtering 

Answer: AC 


Q62. Which of the following is a secret numeric password shared between a user and a system for authenticating the user to the system? 

A. Key escrow

B. Public key 

C. Private key 

D. PIN 

Answer:


Q63. Which of the following is an organization that defines standards for anti-virus software? 

A. ICSA

B. IETF 

C. IIS 

D. IEEE 

Answer:


Q64. You work as a network administrator for an insurance company called InZed Inc. The company has developed a corporate policy that requires all machines to use the IPSec security protocol. If the computer they are logging in from does not follow this corporate policy, they will be denied access to the network. Which of the following can you set up to help enforce the corporate policy? 

A. Server Access Protection 

B. System Center Data Protection Manager (DPM) 

C. Microsoft Assessment and Planning (MAP) Toolkit 

D. Network Access Protection 

Answer:


Q65. You have bought a Windows Vista Enterprise Edition computer. You want to enable BitLocker encryption through the Control Panel. In the Startup Preference dialog box, choose the startup options that can be selected if the computer has a built-in TPM chip. 

Answer: 


Q66. Ron owns the domain TechPerfect.net. He often receives bounces about messages he didn't send. After looking at all such mails, he is sure that someone is spamming e-mails and using his domain name. What will Ron do to ensure that his domain name is not exploited? 

A. Publish the MX record for the domain. 

B. Publish the SPF record for the domain. 

C. Publish the AAAA record for the domain. 

D. Publish the A record for the domain. 

Answer:


Q67. Which of the following ports is used by the IMAP4 protocol? 

A. 443 

B. 53 

C. 143 

D. 110 

Answer:


Q68. Which of the following can be installed for ensuring that the domain is secure in the remote locations?

A. Read-Only domain controller (RODC) 

B. Microsoft Baseline Security Analyzer 

C. Windows Software Update Services 

D. DNS dynamic update 

Answer:


Q69. Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to implement a method to ensure that the mobile devices are in a good state of security health when they are trying to access the corporate network. Which of the following is a control or strategy that Mark will implement to assure the security health?

A. TCP/IP protocol

B. Kerberos

C. Single Sign On

D. Network Access Protection

Answer: D


Q70. Which of the following actions should be taken so that the computer requires confirmation before installing an ActiveX component?

A. Configuring a firewall on the network

B. Configuring the settings on the Web Browser

C. Installing an anti-virus software

D. Configuring DMZ on the network

Answer: