getcertified4sure.com

Examples of mta exam 98 367




Master the mta 98 367 MTA Security Fundamentals Practice Test content and be ready for exam day success quickly with this Exambible mta exam 98 367 dumps. We guarantee it!We make it a reality and give you real mta 98 367 questions in our Microsoft mta exam 98 367 braindumps.Latest 100% VALID Microsoft security fundamentals mta exam 98 367 Exam Questions Dumps at below page. You can use our Microsoft security fundamentals mta exam 98 367 braindumps and pass your exam.

Q51. Your Web server crashes at exactly the point where it reaches 1 million total visits. You discover the cause of the server crash is malicious code. Which description best fits this code? 

A. Virus 

B. Worm 

C. Polymorphic Virus 

D. Logic Bomb 

Answer:


Q52. Mark works as the Network Administrator of a Windows 2000 based network. In order to reduce the administrative burden and to optimize the network performance, he implements the DHCP and the DNS servers on the network. What will he do integrate the working between the DHCP and the DNS servers? Each correct answer represents a part of the solution. Choose two. 

A. Configure the clients to use the DHCP server. 

B. Enable DNS updates on the DHCP server. 

C. Enable dynamic update on the DNS server. 

D. Use the TCP/IP protocol on the network. 

Answer: BC 


Q53. You work as a Network Administrator for TechMart Inc. The company has a Windows-based network. After completing a security audit of the company's Microsoft Windows Server 2008 R2 file servers, you have determined that folder and share security requires a revision on the basis of corporate reorganization. You have noticed that some shares on the file system are not secured. Which of the following is a feature that you will use to reassign permissions without assigning permissions to every parent and child folder? 

A. Inheritance 

B. Kerberos 

C. TCP/IP protocol 

D. User Account Control (UAC) 

Answer:


Q54. Which of the following is a US Federal government algorithm created to generate a secure message digest?

A. DSA

B. RSA

C. Triple DES

D. SHA

Answer: D


Q55. Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network. The company is adding an open, high-speed, wireless access for their customers and secured wireless for employees at all 37 branches. He wants to check the various security concerns for ensuring that business traffic is secured. He is also in under pressure to make this new feature a winning strategy for a company. Mark wants the employees to be free to troubleshoot their own wireless connections before contacting him. Which of the following is the basic troubleshooting step that he can ask them to do? 

A. To power cycle the wireless access points and then reboot the systems. 

B. To configure the network to use only Extensible Authentication Protocol (EAP). 

C. To reboot the computers they are using and then use the MAC filtering. 

D. To right-click the network icon in the system tray and then select Troubleshoot Problems. 

Answer:


Q56. Which of the following points has to be considered for using the BitLocker? 

A. The deployment of antivirus because BitLocker needs a a removal of buffer overflow. 

B. The deployment of SEAL because BitLocker needs an alternative encryption algorithm to software-based DES, 3DES, and AES. . 

C. The deployment of hardware because BitLocker needs a system reserved partition. 

D. The deployment of hard disk because BitLocker needs a bot. 

Answer:


Q57. Which of the following is a disadvantage of using biometric identification?

A. It breaks the several firewall security rules.

B. It needs a new network configuration of the entire infrastructure.

C. It can be faked and will not be trusted by several organizations.

D. It is expensive and cannot be afforded by several organizations

Answer: D


Q58. Mark works as a Desktop Administrator for TechMart Inc. The company has a Windows-based network. He has bees assigned a project to upgrade the browsers to Internet Explorer (IE) 8 for working with the latest Internet technologies Mark wants to ensure that the company uses a number of the security features built into the browser while maintaining functionality within the company's intranet. Mark is also educating his users to be good Internet citizens and use the safe web sur?ng. Mark asked his team to be assured that they are on a secured website. What they will do? 

A. Take a look for a padlock in the lower right corner of the browser and https:// in the address bar. 

B. Provide protection against a Distributed Denial of Services attack. 

C. Call a team member while behaving to be someone else for gaining access to sensitive information. 

D. Go into the Internet Options, select the Security, and add the intranet site to the list of Local Intranet Site. 

Answer:


Q59. Which of the following viruses infects Word 97 documents and the NORMAL.DOT file of Word 97 and Word 2000? 

A. Chernobyl 

B. Brain 

C. EICAR 

D. Melissa 

Answer:


Q60. Which of the following can search contents of a hard disk, address book of an e-mail, or any information about the computer, and transmit the information to the advertisers or other interested parties without user knowledge? 

A. Malware 

B. Firmware 

C. Spyware 

D. Adware 

Answer: