getcertified4sure.com

Surprising mta 98 367




Validated of mta 98 367 free practice test materials and discount pack for Microsoft certification for IT professionals, Real Success Guaranteed with Updated mta 98 367 pdf dumps vce Materials. 100% PASS MTA Security Fundamentals Practice Test exam Today!

Q21. Which of the following are the major components of the IPsec protocol? Each correct answer represents a complete solution. Choose all that apply. 

A. Encapsulating Security Payload (ESP) 

B. Authentication Header (AH) 

C. Internet Encryption Key (IEK) 

D. Internet Key Exchange (IKE) 

Answer: ABD 


Q22. Which of the following are the main features of a key logger? Each correct answer represents a complete solution. Choose all that apply. 

A. It can be delivered via FTP or e-mail. 

B. It can record all keystrokes. 

C. It can capture all screenshots. 

D. It can detect viruses on the computer. 

Answer: ABC 


Q23. By default, what level of security is set for the Local intranet zone? 

A. High-Medium 

B. Medium-Low 

C. High 

D. Low 

Answer:


Q24. Which of the following can be installed for ensuring that the domain is secure in the remote locations?

A. Read-Only domain controller (RODC) 

B. Microsoft Baseline Security Analyzer 

C. Windows Software Update Services 

D. DNS dynamic update 

Answer:


Q25. On which of the following is the level of security set for the local intranet zone applied? 

A. To the sites that might potentially damage your computer, or your information. 

B. To the Websites and content that are stored on a corporate, or business network. 

C. To the sites that you have specifically indicated as the ones that you trust. 

D. To all the Websites by default. 

Answer:


Q26. Which of the following is a program that runs at a specific date and time to cause unwanted and unauthorized functions? 

A. Keylogger 

B. Logic bomb 

C. Spyware 

D. Trojan horse 

Answer:


Q27. Mark works as a Network Administrator fot Blue Well Inc. The company has a Windows-based network. Mark is facing a series of problems with email spam and identifying theft via phishing scams. He wants to implement the various security measures and to provide some education because it is related to the best practices while using email. Which of the following can Mark do after enabling reverse DNS lookups to minimize the amount of spam? 

A. Permit User Account Control 

B. Add Sender Policy Framework 

C. Use Read-only Domain Controller 

D. Windows Server Update Services 

Answer:


Q28. Which of the following is a process in which data is changed before or while it is entered into a computer system? 

A. Data diddling 

B. Authentication 

C. Domain kiting 

D. Packet sniffing 

Answer:


Q29. Which of the following is a secret numeric password shared between a user and a system for authenticating the user to the system? 

A. Key escrow

B. Public key 

C. Private key 

D. PIN 

Answer:


Q30. Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network uses Network Access Protection (NAP). The company's employees at the remote locations are connecting to the company's network from their Windows Vista clients. Mark wants to ensure that the data transmission between a client computer and the company's network is as secure as possible. What will Mark do to accomplish the task? 

A. Use Encrypting File System (Efs) between the client computer and the company's network. 

B. Use IPSec NAP policy between client computer and the company's network. 

C. Use VPN connection with MS-CHAP v2 between the client computer and the company's network. 

D. Use NAP enforcement for DHCP. 

Answer: