getcertified4sure.com

Super to security fundamentals mta exam 98 367




Pass4sure mta exam 98 367 Questions are updated and all mta exam 98 367 answers are verified by experts. Once you have completely prepared with our mta exam 98 367 exam prep kits you will be ready for the real security fundamentals mta exam 98 367 exam without a problem. We have Refresh Microsoft mta 98 367 dumps study guide. PASSED mta 98 367 First attempt! Here What I Did.

Q11. Which of the following terms refers to the access of a wireless Internet connection by bringing one's own computer within the range of another's wireless connection, and using that service without the subscriber's explicit permission or knowledge?

A. Samhain

B. Snooping

C. Piggybacking

D. Vampire tap

Answer: C


Q12. Which of the following practices should be followed to keep passwords secure? Each correct answer represents a complete solution. Choose three. 

A. Change the passwords whenever there is suspicion that they may have been compromised. 

B. A password should be alpha-numeric. 

C. A password should not be more than five words. 

D. Never write down a password. 

Answer: ABD 


Q13. You check the logs on several clients and find that there is traffic coming in on an odd port (port 1872). All clients have the Windows XP firewall turned on. What should you do to block this unwanted traffic? 

A. Perform a virus scan to find the virus responsible for this traffic. 

B. Check the exceptions in the firewall and unselect that port exception. 

C. Trace back that traffic and find its origin. 

D. Shut down the service that connects to that port. 

Answer:


Q14. Which of the following is used to protect all files stored on the drive on which Windows is installed? 

A. SocketShield 

B. Firewall 

C. Bitlocker 

D. Hardware keylogger 

Answer:


Q15. Which of the following is defined as a digitally signed statement used to authenticate and to secure information on open networks? 

A. Kerberos 

B. Public certificate 

C. Single sign-on (SSO) 

D. SEAL 

Answer:


Q16. Which of the following is the result of setting the value of Enforce Password History to 10?

A. The system will remember the last 10 passwords and will not permit the user to reuse any of those passwords.

B. The user is granted with a permission of 10 attempts to validate the password

C. The password can be changed only after 10 days of its creation.

D. The system will automatically generate the new 10 passwords that can be used by the user.

Answer: A


Q17. Which of the following is the process of keeping track of a user's activity while accessing network resources? 

A. Authentication 

B. Auditing 

C. Spoofing 

D. Biometrics 

Answer:


Q18. Which of the following is often used for one-to-many communications using broadcast or multicast IP datagrams? 

A. UDP 

B. FTP 

C. HTTP 

D. SMTP 

Answer:


Q19. Which of the following security methods can be used to detect the DoS attack in order to enhance the security of the network? 

A. Protocol analyzer

B. WIPS 

C. WLAN controller 

D. Spectrum analyzer 

Answer:


Q20. Which of the following is a tool that can be used to evaluate the servers having vulnerabilities that are related to the operating system and installed software? 

A. DNS dynamic update 

B. Windows Software Update Services 

C. Read-Only domain controller (RODC) 

D. Microsoft Baseline Security Analyzer 

Answer: