getcertified4sure.com

Today Big Q: mta exam 98 367?




100% Correct of mta exam 98 367 exam cram materials and testing material for Microsoft certification for IT examinee, Real Success Guaranteed with Updated mta 98 367 pdf dumps vce Materials. 100% PASS MTA Security Fundamentals Practice Test exam Today!

Q41. Your Web server crashes at exactly the point where it reaches 1 million total visits. You discover the cause of the server crash is malicious code. Which description best fits this code? 

A. Virus 

B. Worm 

C. Polymorphic Virus 

D. Logic Bomb 

Answer:


Q42. Which of the following is more secure protocol between Point to Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP)?

A. PPTP and L2TP, both of them define the same security standard.

B. PPTP is more secure than L2TP.

C. PPTP and L2TP , both of them are used to provide the database connection.

D. L2TP is more secure than PPTP.

Answer: D


Q43. The stronger password is a critical element in the security plan. Which of the following are the characteristics used to make up a strong password? 

A. It contains more than seven hundred characters and does not contain the user name, real name, or any name that can be guessed by the attacker easily. 

B. It contains more than seven characters and does not contain the user name, real name, or anyname that can be guessed by the attacker easily. 

C. It contains the user name, real name, or any name that can be remembered easily and does not contain more than seven characters. 

D. It contains more than seven characters and the user name, real name, or any name. 

Answer:


Q44. Mark works as a Security Officer for TechMart Inc. The company has a Windows-based network. He has bees assigned a project for ensuring the safety of the customer's money and information, not to mention the company's reputation. The company has gone through a security audit to ensure that it is in compliance with industry regulations and standards. Mark understands the request and has to do his due diligence for providing any information the regulators require as they are targeting potential security holes. In this situation, his major concern is the physical security of his company's system. Which of the following actions will Mark take to ensure the physical security of the company's desktop computers? 

A. Call a team member while behaving to be someone else for gaining access to sensitive information. 

B. Develop a social awareness of security threats within an organization. 

C. Use group policies to disable the use of floppy drives or USB drives. 

D. Provide protection against a Distributed Denial of Services attack. 

Answer:


Q45. Which of the following protects against unauthorized access to confidential information via encryption and works at the network layer?

A. Firewall

B. NAT 

C. IPSec 

D. MAC address 

Answer:


Q46. Which of the following MMC snap-in consoles is used to administer the replication of directory data among all sites in an Active Directory Domain Services (AD DS) forest? 

A. Active Directory Domains and Trusts

B. Active Directory Administrative Center 

C. Group Policy Management Console 

D. Active Directory Sites and Services 

Answer:


Q47. Which of the following is a collection or list of user accounts or computer accounts? 

A. Group 

B. Active Directory 

C. Domain 

D. Public folder 

Answer:


Q48. Which of the following are the features of security level in the Restricted Sites zone 

A. The protection against harmful content is provided. 

B. The maximum safeguards are used. 

C. Most of the features are disabled. 

D. The default security level is low. 

Answer: ABC 


Q49. Which of the following is a set of rules that control the working environment of user accounts and computer accounts? 

A. Mandatory Access Control 

B. Access control list 

C. Group Policy 

D. Intrusion detection system 

Answer:


Q50. Which of the following is used to create a secured connection over an unsecured network? 

A. TCP/IP protocol 

B. Virtual Private Network (VPN) 

C. Single Sign-on (SSO) 

D. Kerberos 

Answer: