Accurate of mta exam 98 367 practice materials and faq for Microsoft certification for IT examinee, Real Success Guaranteed with Updated security fundamentals mta exam 98 367 pdf dumps vce Materials. 100% PASS MTA Security Fundamentals Practice Test exam Today!
Q81. Which of the following is method that can be used to identify Internet software in Software Restriction Policies?
A. Restriction rule
B. Identification rule
C. Internet rule
D. Zone rule
Answer: D
Q82. Which of the following actions should be taken so that the computer requires confirmation before installing an ActiveX component?
A. Configuring a firewall on the network
B. Configuring the settings on the Web Browser
C. Installing an anti-virus software
D. Configuring DMZ on the network
Answer: B
Q83. Which of the following can be used to implement two-factor authentications? Each correct answer represents a complete solution. Choose all that apply.
A. Firewall security rule
B. Password
C. Smart card
D. Encrypted network configuration
Answer: BC
Q84. Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network He has been assigned a project to take care of the sensitive data that can be hacked if any of the laptop computers would be misplaced. Mark is required to ensure the con? dentiality of data on the mobile stations, all of which are running Windows 7 Enterprise. Which of the following will Mark use to accomplish the task?
A. BitLocker
B. Confidential File System
C. Kerberos
D. Encrypting File System (EFS)
Answer: A
Q85. Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network. The company is adding an open, high-speed, wireless access for their customers and secured wireless for employees at all 37 branches. He wants to check the various security concerns for ensuring that business traffic is secured. He is also under pressure to make this new feature a winning strategy for a company.
In which of the following ways can Mark add another level of security after implanting encryption techniques for the business wireless traffic? Each correct answer represents a complete solution. Choose all that apply.
A. Hide the Service Set Identifier (SSID)
B. Configure the network to use only Extensible Authentication Protocol (EAP)
C. Implement access point isolation and
D. Use MAC filtering
Answer: AC
Q86. Which of the following types of attack is used to configure a computer to behave as another computer on a trusted network by using the IP address or the physical address?
A. Distributed denial of service (DDOS) attack
B. Honeypot
C. RIP/SAP Spoofing
D. Identity spoofing
Answer: D
Q87. You are taking over the security of an existing network. You discover a machine that is not being used as such, but has software on it that emulates the activity of a sensitive database server. What is this?
A. A Polymorphic Virus
B. A Honey Pot
C. A reactive IDS.
D. A Virus
Answer: B
Q88. Which of the following are the uses of Network Access Protection (NAP)?
Each correct answer represents a complete solution. Choose all that apply.
A. It is used to protect against virus.
B. It is used to verify the complete integrity of each device.
C. It permits a user to access all computers and systems where he got a access permission, without entering passwords for multiple times
D. It is used to authenticate a request for a service in a computer network.
Answer: AB
Q89. You work as an Exchange Administrator for TechWorld Inc. The company has a Windows 2008 Active Directory-based network. The network contains an Exchange Server 2010 organization. You are in the process of choosing an authentication method for Exchange ActiveSync. You need an authentication method that requires both, a password and an external device. Which of the following authentication methods will you choose for Exchange ActiveSync?
A. Device-based authentication
B. Basic authentication
C. Certificate-based authentication
D. Token-based authentication
Answer: D
Q90. Which of the following is a service can be enabled to ensure that the servers are able to receive all essential software updates?
A. Windows Software Update Services
B. Read-Only domain controller (RODC)
C. Microsoft Baseline Security Analyzer
D. DNS dynamic update
Answer: A