getcertified4sure.com

What tells you about security fundamentals mta exam 98 367




Master the mta exam 98 367 MTA Security Fundamentals Practice Test content and be ready for exam day success quickly with this Testking mta exam 98 367 study guide. We guarantee it!We make it a reality and give you real security fundamentals mta exam 98 367 questions in our Microsoft security fundamentals mta exam 98 367 braindumps.Latest 100% VALID Microsoft mta 98 367 Exam Questions Dumps at below page. You can use our Microsoft mta exam 98 367 braindumps and pass your exam.

Q1. Which of the following collects email addresses of users and creates a mailing list? 

A. Browser

B. Cookie 

C. Spambot 

D. Perimeter network 

Answer:


Q2. Which of the following is the edge between the private and locally managed-and-owned side of a network and the public side that is commonly managed by a service provider? 

A. Internet

B. Network perimeter 

C. Intranet 

D. VLAN 

Answer:


Q3. Which of the following is a secret numeric password shared between a user and a system for authenticating the user to the system? 

A. PIN 

B. Private key 

C. Key escrow 

D. Public key 

Answer:


Q4. You work as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains 4 Windows Server 2008 member server and 120 Windows Vista client computers. Your assistant wants to know about the settings that make up Network Access Protection (NAP) health policies. Choose the settings that are the part of Network Access Protection (NAP) health policies. 

Answer: 


Q5. Which of the following are the types of group scopes? Each correct answer represents a complete solution. Choose all that apply. 

A. Global 

B. Domain Users 

C. Universal 

D. Domain local 

Answer: ACD 


Q6. Which of the following types of viruses protects itself from antivirus programs and is more difficult to trace? 

A. Armored virus 

B. MBR virus 

C. Boot sector virus 

D. Macro virus 

Answer:


Q7. Which of the following can be installed and configured to prevent suspicious emails from entering the user's network?

A. Kerberos

B. Single sign-on (SSO)

C. TCP/IP protocol

D. Microsoft Forefront and Threat Management Gateway

Answer:


Q8. Mark works as a Network Administrator fot Blue Well Inc. The company has a Windows-based network. Mark is facing a series of problems with email spam and identifying theft via phishing scams. He wants to implement the various security measures and to provide some education because it is related to the best practices while using email. Which of the following can Mark do after enabling reverse DNS lookups to minimize the amount of spam? 

A. Permit User Account Control 

B. Add Sender Policy Framework 

C. Use Read-only Domain Controller 

D. Windows Server Update Services 

Answer:


Q9. Which of the following is defined as a digitally signed statement used to authenticate and to secure information on open networks? 

A. Kerberos 

B. Public certificate 

C. Single sign-on (SSO) 

D. SEAL 

Answer:


Q10. Which of the following terms refers to the access of a wireless Internet connection by bringing one's own computer within the range of another's wireless connection, and using that service without the subscriber's explicit permission or knowledge?

A. Samhain

B. Snooping

C. Piggybacking

D. Vampire tap

Answer: C