Want to know Pass4sure security fundamentals mta exam 98 367 Exam practice test features? Want to lear more about Microsoft MTA Security Fundamentals Practice Test certification experience? Study Tested Microsoft mta 98 367 answers to Rebirth mta exam 98 367 questions at Pass4sure. Gat a success with an absolute guarantee to pass Microsoft mta 98 367 (MTA Security Fundamentals Practice Test) test on your first attempt.
Q1. Which of the following viruses cannot be detected by the signature-based antivirus?
A. Polymorphic
B. MBR virus
C. Boot sector
D. Macro
Answer: A
Q2. Which of the following are required to enable for preventing the users from downloading and installing software from the Internet? Each correct answer represents a complete solution. Choose all that apply.
A. Software restriction policies
B. PTR record
C. User Account Control
D. Anti-Virus software
Answer: AC
Q3. Mark works as a Security Officer for TechMart Inc. The company has a Windows-based network. He has bees assigned a project for ensuring the safety of the customer's money and information, not to mention the company's reputation. The company has gone through a security audit to ensure that it is in compliance with industry regulations and standards. Mark understands the request and has to do his due diligence for providing any information the regulators require as they are targeting potential security holes. In this situation, his major concern is the physical security of his company's system. He has a concern that people are authenticated to the servers in the data center. Which of the following actions will Mark take to prevent normal users from logging onto the systems?
A. Call a team member while behaving to be someone else for gaining access to sensitive information.
B. Use group policies to disable the use of floppy drives or USB drives.
C. Provide protection against a Distributed Denial of Services attack.
D. Develop a social awareness of security threats within an organization.
Answer: B
Q4. You are responsible for virus protection for a large college campus. You are very concerned that your antivirus solution must be able to capture the latest virus threats. What sort of virus protection should you implement?
A. Network Based
B. Host based
C. Dictionary
D. Heuristic
Answer: D
Q5. Which of the following security features of IE 7+ makes it more difficult for malware to be installed?
A. Security zones
B. Phishing filter
C. Protected mode
D. Pop-up blocker
Answer: C
Q6. Which of the following refers to a security access control methodology whereby the 48-bit address is assigned to each network card which is used to determine access to the network?
A. Snooping
B. Spoofing
C. Encapsulation
D. MAC filtering
Answer: D
Q7. Which of the following is used to create a secured connection over an unsecured network?
A. TCP/IP protocol
B. Virtual Private Network (VPN)
C. Single Sign-on (SSO)
D. Kerberos
Answer: B
Q8. Which of the following root keys stores information about registered applications?
A. HKEY_USERS
B. HKEY_CLASSES_ROOT
C. HKEY_CURRENT_CONFIG
D. HKEY_CURRENT_USER
Answer: B
Q9. Which of the following is a disadvantage of using biometric identification?
A. It breaks the several firewall security rules.
B. It needs a new network configuration of the entire infrastructure.
C. It can be faked and will not be trusted by several organizations.
D. It is expensive and cannot be afforded by several organizations
Answer: D
Q10. Which of the following are the Internet Explorer security zones? Each correct answer represents a complete solution. Choose three.
A. Trusted sites
B. Internet
C. Local intranet
D. Extranet
Answer: ABC