getcertified4sure.com

Key benefits of mta exam 98 367




we provide Real Microsoft mta exam 98 367 test question which are the best for clearing security fundamentals mta exam 98 367 test, and to get certified by Microsoft MTA Security Fundamentals Practice Test. The mta exam 98 367 Questions & Answers covers all the knowledge points of the real security fundamentals mta exam 98 367 exam. Crack your Microsoft security fundamentals mta exam 98 367 Exam with latest dumps, guaranteed!

Q61. Mark works as a Network Administrator for BlueWell Inc. The company has a Windows-based network. Mark has retained his services to perform a security assessment of the company's network that has various servers exposed to the Internet. So, it may be vulnerable to an attack. Mark is using a single perimeter ?rewall, but he does not know if that is enough. He wants to review the situation and make some reliable recommendations so that he can protect the data over company's network. Which of the following will Mark do to accomplish the task? 

A. Outsource the related services. 

B. Encrypt the data and than start transmission. 

C. Locate the Internet-exposed servers and devices in an internal network. 

D. Create a perimeter network to isolate the servers from the internal network. 

Answer:


Q62. Which of the following are indications of a virus attack on a computer? Each correct answer represents a complete solution. Choose three. 

A. Although the computer has sufficient memory, an out-of-memory error message is displayed. 

B. The applications installed on the computer system work properly. 

C. An antivirus program is not able to run. 

D. The computer runs slower than usual and stops responding. 

Answer: ACD 


Q63. Which of the following works at the network layer and hides the local area network IP address and topology?

A. Network address translation (NAT) 

B. MAC address 

C. Hub 

D. Network interface card (NIC) 

Answer:


Q64. Mark works as a Network Administrator fot Blue Well Inc. The company has a Windows-based network. Mark is facing a series of problems with email spam and identifying theft via phishing scams. He wants to implement the various security measures and to provide some education because it is related to the best practices while using email. Which of the following will Mark ask to employees of his company to do when they receive an email from a company they know with a request to click the link to "verify their account information"? 

A. Provide the required information 

B. Hide the email 

C. Use Read-only Domain Controller 

D. Delete the email 

Answer:


Q65. Which of the following is a Windows configuration option that enables administrators to restrict

communication among domain members only?

A. Demilitarized zone

B. Server isolation

C. Domain isolation

D. Domain kiting

Answer:


Q66. Mark works as a Security Administrator for TechMart Inc. The company has a Windows-based network. Mark has gone through a security audit for ensuring that the technical system is secure and protected. While this audit, he identified many areas that need improvement. He wants to minimize the risk for potential security threats by educating team members in the area of social engineering, and providing basic security principle knowledge and he also wants to stress the Con?dentiality, Integrity, and Availability triangle in his training. For this purpose, he plans to implement the principle of least privilege. In which of the following way, it will affect his team members? 

A. They are required to ask administrator every time when they want to access resources. 

B. They are granted with a smallest set of privileges to the resources 

C. They are required to log on as administrator to have access to their resources 

D. The current resource access of team members will not change. 

Answer:


Q67. You work as a Network Administrator for TechMart Inc. The company has a Windows-based network. After completing a security audit of the company's Microsoft Windows Server 2008 R2 file servers, you have determined that folder and share security requires a revision on the basis of corporate reorganization. You have noticed that some shares on the file system are not secured. Which of the following is the default permission setting that you have used when a share is created? 

A. Everyone with Change permission 

B. Administrators with the Full Control permission 

C. Administrators with the Change permission 

D. Everyone with Read permission 

Answer:


Q68. Mark works as a Security Officer for TechMart Inc. The company has a Windows-based network. He has bees assigned a project for ensuring the safety of the customer's money and information, not to mention the company's reputation. The company has gone through a security audit to ensure that it is in compliance with industry regulations and standards. Mark understands the request and has to do his due diligence for providing any information the regulators require as they are targeting potential security holes. In this situation, his major concern is the physical security of his company's system. He has a concern that people are authenticated to the servers in the data center. Which of the following actions will Mark take to prevent normal users from logging onto the systems?

A. Call a team member while behaving to be someone else for gaining access to sensitive information.

B. Use group policies to disable the use of floppy drives or USB drives.

C. Provide protection against a Distributed Denial of Services attack.

D. Develop a social awareness of security threats within an organization.

Answer: B


Q69. Which of the following is an authentication protocol? 

A. Kerberos 

B. LDAP 

C. TLS 

D. PPTP 

Answer:


Q70. Which of the following is a physical address stored in the Network Interface card on your system or any other device residing on your network?

A. IP address

B. I/O address

C. MAC Address

D. Broadcast address

Answer: C