Want to know Exambible mta exam 98 367 Exam practice test features? Want to lear more about Microsoft MTA Security Fundamentals Practice Test certification experience? Study Approved Microsoft mta exam 98 367 answers to Update mta 98 367 questions at Exambible. Gat a success with an absolute guarantee to pass Microsoft mta exam 98 367 (MTA Security Fundamentals Practice Test) test on your first attempt.
Q21. Which of the following are the types of OS fingerprinting techniques? Each correct answer represents a complete solution. Choose two.
A. Passive fingerprinting
B. Active fingerprinting
C. Laser fingerprinting
D. Unidirectional fingerprinting
Answer: AB
Q22. Which of the following is the process of keeping track of a user's activity while accessing network resources?
A. Authentication
B. Auditing
C. Spoofing
D. Biometrics
Answer: B
Q23. Which of the following tools traces all or specific activities of a user on a computer?
A. Task Manager
B. Event Viewer
C. Network Monitor
D. Keylogger
Answer: D
Q24. Which of the following viruses infects Word 97 documents and the NORMAL.DOT file of Word 97 and Word 2000?
A. Chernobyl
B. Brain
C. EICAR
D. Melissa
Answer: D
Q25. You work as a Network Administrator for TechMart Inc. The company has a Windows-based network. After completing a security audit of the company's Microsoft Windows Server 2008 R2 file servers, you have determined that folder and share security requires a revision on the basis of corporate reorganization. You have noticed that some shares on the file system are not secured. Which of the following is a feature that you will use to reassign permissions without assigning permissions to every parent and child folder?
A. Inheritance
B. Kerberos
C. TCP/IP protocol
D. User Account Control (UAC)
Answer: A
Q26. You work as an Exchange Administrator for UniCom Inc. The company has a Windows 2003 Active Directory-based network. The network contains an Exchange Server 2007 organization. You have deployed a DNS server in your messaging organization. The DNS server hosting the DNS zone data for the Exchange Server is not capable of processing dynamic DNS updates. You decide to troubleshoot DNS. Which of the following utilities will you use to identify anomalies of records in the targeted DNS zone?
A. Nslookup.exe
B. IPCONFIG
C. DNSCMD.exe
D. DNSLint
Answer: D
Q27. Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network. The company is adding an open, high-speed, wireless access for their customers and secured wireless for employees at all 37 branches. He wants to check the various security concerns for ensuring that business traffic is secured. He is also under pressure to make this new feature a winning strategy for a company. Which of the following is the most secure protocol that Mark can implement to ensure that the business-related traffic is encrypted?
A. WiFi Protected Access (WPA) 2
B. Extensible Authentication Protocol (EAP)
C. Wired Equivalent Privacy (WEP)
D. Service Set Identifiers
Answer: A
Q28. Which of the following is a service can be enabled to ensure that the servers are able to receive all essential software updates?
A. Windows Software Update Services
B. Read-Only domain controller (RODC)
C. Microsoft Baseline Security Analyzer
D. DNS dynamic update
Answer: A
Q29. Mark works as a Security Officer for TechMart Inc. The company has a Windows-based network. He has bees assigned a project for ensuring the safety of the customer's money and information, not to mention the company's reputation. The company has gone through a security audit to ensure that it is in compliance with industry regulations and standards. Mark understands the request and has to do his due diligence for providing any information the regulators require as they are targeting potential security holes. In this situation, his major concern is the physical security of his company's system. Which of the following actions will Mark take to prevent the use of key loggers in the company?
A. Provide protection against a Distributed Denial of Services attack.
B. Call a team member while behaving to be someone else for gaining access to sensitive information.
C. Ensure that the terminals are locked and perform a regular inspection of the ports on the systems.
D. Develop a social awareness of security threats within an organization.
Answer: C
Q30. You work as a Network Administrator for SpyNet Inc. The company has a Windows-based network. You have been assigned the task of auditing the scheduled network security. After a regular audition, you suspect that the company is under attack by an intruder trying to gain access to the company's network resources. While analyzing the log files, you find that the IP address of the intruder belongs to a trusted partner company. Assuming this situation, which of the following attacks is the company being subjected to?
A. Spoofing
B. Man-in-the-middle
C. CookieMonster
D. Phreaking
Answer: A