getcertified4sure.com

Facts about security fundamentals mta exam 98 367




Want to know Testking mta exam 98 367 Exam practice test features? Want to lear more about Microsoft MTA Security Fundamentals Practice Test certification experience? Study Certified Microsoft mta 98 367 answers to Regenerate security fundamentals mta exam 98 367 questions at Testking. Gat a success with an absolute guarantee to pass Microsoft security fundamentals mta exam 98 367 (MTA Security Fundamentals Practice Test) test on your first attempt.

Q91. You work as a security manager for Company Inc. An individual is connecting to your corporate internal network over the Internet. You have to ensure that he is not an intruder masquerading as an authorized user. Which of the following technologies will you use to accomplish the task? 

A. Two-factor authentication 

B. IP address packet filtering 

C. Intrusion detection system (IDS) 

D. Embedded digital signature 

Answer:


Q92. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution. Choose two. 

A. It allows the computers in a private network to share a global, ISP assigned address to connect to the Internet. 

B. It provides added security by using Internet access to deny or permit certain traffic from the Bastion Host. 

C. It allows external network clients access to internal services. 

D. It reduces the need for globally unique IP addresses. 

Answer: AD 


Q93. Mark works as a Network Administrator fot Blue Well Inc. The company has a Windows-based network. Mark is facing a series of problems with email spam and identifying theft via phishing scams. He wants to implement the various security measures and to provide some education because it is related to the best practices while using email. Which of the following can Mark use to minimize the spam amount that is hitting the Microsoft Exchange server of the company? 

A. Enable reverse DNS lookup 

B. Use Read-only Domain Controller 

C. Add Sender Policy Framework 

D. Permit User Account Control 

Answer:


Q94. You work as a Network Administrator for TechMart Inc. The company has a Windows-based network. After completing a security audit of the company's Microsoft Windows Server 2008 R2 file servers, you have determined that folder and share security requires a revision on the basis of corporate reorganization. You have noticed that some shares on the file system are not secured. Which of the following will you use to prevent unauthorized changes to computers on the domain? 

A. TCP/IP protocol 

B. Kerberos 

C. User Account Control (UAC) 

D. Lightweight Directory Access Protocol 

Answer:


Q95. Which of the following is used to create a secured connection over an unsecured network? 

A. TCP/IP protocol 

B. Virtual Private Network (VPN) 

C. Single Sign-on (SSO) 

D. Kerberos 

Answer:


Q96. Which of the following are required to enable for preventing the users from downloading and installing software from the Internet? Each correct answer represents a complete solution. Choose all that apply. 

A. Software restriction policies 

B. PTR record 

C. User Account Control 

D. Anti-Virus software 

Answer: AC