Want to know Actualtests mta 98 367 Exam practice test features? Want to lear more about Microsoft MTA Security Fundamentals Practice Test certification experience? Study 100% Correct Microsoft mta 98 367 answers to Update mta exam 98 367 questions at Actualtests. Gat a success with an absolute guarantee to pass Microsoft security fundamentals mta exam 98 367 (MTA Security Fundamentals Practice Test) test on your first attempt.
Q71. Mark work as a System Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to allow the remote travel agents to be able to access the corporate network so that they are free to check email and post appointments that are booked for the particular day. Mark has decided to permit the travel agents to use their home computers but he is required to be assured that the information is not compromised by anyone because the security of client information is on the top priority for him. Which of the following will Mark use to accomplish the task?
A. Implement the principle of least privilege that permits the travel agents for remote access.
B. Implement a Wi-Fi Protected Access that permits the travel agents for remote access.
C. Implement a Wired Equivalent Privacy that permits the travel agents for remote access.
D. Implement a VPN server that permits the travel agents for remote access.
Answer: D
Q72. Which of the following infects the computer and then hides itself from detection by antivirus software?
A. EICAR virus
B. Boot-sector virus
C. Macro virus
D. Stealth virus
Answer: D
Q73. Which of the following are the Internet Explorer security zones? Each correct answer represents a complete solution. Choose three.
A. Trusted sites
B. Internet
C. Local intranet
D. Extranet
Answer: ABC
Q74. Which of the following layers defines the mechanisms that allow data to be passed from one network to another?
A. Network layer
B. Session layer
C. Physical layer
D. Data-link layer
Answer: A
Q75. You work as an Exchange Administrator for UniCom Inc. The company has a Windows 2003 Active Directory-based network. The network contains an Exchange Server 2007 organization. You have deployed a DNS server in your messaging organization. The DNS server hosting the DNS zone data for the Exchange Server is not capable of processing dynamic DNS updates. You decide to troubleshoot DNS. Which of the following utilities will you use to identify anomalies of records in the targeted DNS zone?
A. Nslookup.exe
B. IPCONFIG
C. DNSCMD.exe
D. DNSLint
Answer: D
Q76. You have bought a Windows Vista Enterprise Edition computer. You want to enable BitLocker encryption through the Control Panel. In the Startup Preference dialog box, choose the startup options that can be selected if the computer has a built-in TPM chip.
Answer:
Q77. Which of the following states that a user should never be given more privileges than are required to
carry out a task?
A. Security through obscurity
B. Segregation of duties
C. Principle of least privilege
D. Role-based security
Answer: C
Q78. Which of the following is a use of Microsoft Windows Malicious Software Removal Tool?
A. To gain unauthorized remote access to a computer and launch additional attacks.
B. To distribute itself automatically from one computer to another via network connections.
C. To remove the malware.
D. To perform repetitive or time-consuming task on a network.
Answer: C
Q79. Which of the following uses a symmetric encryption algorithm that takes a lesser amount of time to encrypt or decrypt large amounts of data.
A. BitLocker
B. SSID
C. BitLocker To Go
D. EFS
Answer: D
Q80. Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to implement stronger authentication measures for the customers, as well as eliminate IT staff from logging on with high privileges. Mark has various options, but he is required to keep the processes easy for the helpdesk staff. Which of the following is a service can the staff uses as an alternative of signing in with elevate privileges?
A. Secondary Logon-Run As
B. Security log
C. Hardware firewall
D. Encrypted network configuration
Answer: A