getcertified4sure.com

A Complete Guide to mta 98 367




Proper study guides for Up to the minute Microsoft MTA Security Fundamentals Practice Test certified begins with Microsoft mta 98 367 preparation products which designed to deliver the Simulation mta exam 98 367 questions by making you pass the security fundamentals mta exam 98 367 test at your first time. Try the free mta 98 367 demo right now.

Q81. Which of the following is an authentication protocol? 

A. Kerberos 

B. LDAP 

C. TLS 

D. PPTP 

Answer:


Q82. Which of the following works at the network layer and hides the local area network IP address and topology?

A. Network address translation (NAT) 

B. MAC address 

C. Hub 

D. Network interface card (NIC) 

Answer:


Q83. John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation? Each correct answer represents a complete solution. Choose all that apply. 

A. He should restore his Windows settings. 

B. He should upgrade his antivirus program. 

C. He should observe the process viewer (Task Manager) to see whether any new process is running on the computer or not. If any new malicious process is running, he should kill that process. 

D. He should download the latest patches for Windows Server 2003 from the Microsoft site, so that he can repair the kernel. 

Answer: BC 


Q84. You work as a Network Administrator for NetTech Inc. Your computer has the Windows 2000 Server operating system. You want to harden the security of the server. Which of the following changes are required to accomplish this? Each correct answer represents a complete solution. Choose two. 

A. Enable the Guest account. 

B. Rename the Administrator account. 

C. Remove the Administrator account. 

D. Disable the Guest account. 

Answer: BD 


Q85. Which of the following is a physical address stored in the Network Interface card on your system or any other device residing on your network?

A. IP address

B. I/O address

C. MAC Address

D. Broadcast address

Answer: C


Q86. Which of the following services does IPSec provide for protecting data? Each correct answer represents a complete solution. Choose two. 

A. Network authentication 

B. Encryption 

C. Data authentication 

D. Compression 

Answer: BC 


Q87. Which of the following is a central, secure database in which Windows stores all hardware configuration information, software configuration information, and system security policies? 

A. Registry 

B. Program files folder 

C. DLL file 

D. Configuration file 

Answer:


Q88. Which of the following is a broadcast domain created by a switch? 

A. VLAN 

B. MAN 

C. DMZ 

D. VPN 

Answer:


Q89. Which of the following uses a symmetric encryption algorithm that takes a lesser amount of time to encrypt or decrypt large amounts of data. 

A. BitLocker 

B. SSID 

C. BitLocker To Go 

D. EFS 

Answer:


Q90. Which of the following can be implemented to ensure that the computers are using latest security updates?

A. Hardening

B. Windows Software Update Services

C. Microsoft Baseline Security Analyzer

D. Domain Name System

Answer: B