Cause all that matters here is passing the Microsoft mta 98 367 exam. Cause all that you need is a high score of security fundamentals mta exam 98 367 MTA Security Fundamentals Practice Test exam. The only one thing you need to do is downloading Ucertify security fundamentals mta exam 98 367 exam study guides now. We will not let you down with our money-back guarantee.
Q41. You have configured a virtualized Internet browser on your Windows XP professional computer. Using the virtualized Internet browser, you can protect your operating system from which of the following?
A. Brute force attack
B. Distributed denial of service (DDOS) attack
C. Mail bombing
D. Malware installation from unknown Web sites
Answer: D
Q42. Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network. The company is adding an open, high-speed, wireless access for their customers and secured wireless for employees at all 37 branches. He wants to check the various security concerns for ensuring that business traffic is secured. He is also under pressure to make this new feature a winning strategy for a company. Which of the following is the most secure protocol that Mark can implement to ensure that the business-related traffic is encrypted?
A. WiFi Protected Access (WPA) 2
B. Extensible Authentication Protocol (EAP)
C. Wired Equivalent Privacy (WEP)
D. Service Set Identifiers
Answer: A
Q43. Which of the following ports is used by the Remote Desktop Protocol?
A. 80
B. 23
C. 3389
D. 110
Answer: C
Q44. Which of the following are types of password policies of Windows 7? Each correct answer represents a complete solution. Choose all that apply.
A. Store Password Using Reversible Encryption
B. Minimum Password Length
C. User Name Length
D. Password Must Meet Complexity Requirements
Answer: ABD
Q45. What are the main classes of biometric characteristics? Each correct answer represents a complete solution. Choose two.
A. Psychological
B. Behavioral
C. Fundamental
D. Physiological
Answer: BD
Q46. Mark works as a Network Administrator for BlueWell Inc. The company has a Windows-based network. Mark has retained his services to perform a security assessment of the company's network that has various servers exposed to the Internet. So, it may be vulnerable to an attack. Mark is using a single perimeter ?rewall, but he does not know if that is enough. He wants to review the situation and make some reliable recommendations so that he can protect the data over company's network. Which of the following will Mark use to inspect network information on the basis of source and destination address?
A. Stateless packet inspection
B. Tricky packet inspection
C. Stateful packet inspection
D. Reaction based packet inspection
Answer: A
Q47. Which of the following security features of IE 7+ makes it more difficult for malware to be installed?
A. Security zones
B. Phishing filter
C. Protected mode
D. Pop-up blocker
Answer: C
Q48. You work as a network administrator for an insurance company called InZed Inc. The company has developed a corporate policy that requires all machines to use the IPSec security protocol. If the computer they are logging in from does not follow this corporate policy, they will be denied access to the network. Which of the following can you set up to help enforce the corporate policy?
A. Server Access Protection
B. System Center Data Protection Manager (DPM)
C. Microsoft Assessment and Planning (MAP) Toolkit
D. Network Access Protection
Answer: D
Q49. Which of the following are the types of OS fingerprinting techniques? Each correct answer represents a complete solution. Choose two.
A. Passive fingerprinting
B. Active fingerprinting
C. Laser fingerprinting
D. Unidirectional fingerprinting
Answer: AB
Q50. Which of the following security features of IE 7+ helps determine whether a Web site is a legitimate site?
A. Protected mode
B. Pop-up blocker
C. Security zones
D. Phishing filter
Answer: D