Your success in Microsoft mta 98 367 is our sole target and we develop all our mta exam 98 367 braindumps in a way that facilitates the attainment of this target. Not only is our mta 98 367 study material the best you can find, it is also the most detailed and the most updated. mta 98 367 Practice Exams for Microsoft MTA security fundamentals mta exam 98 367 are written to the highest standards of technical accuracy.
Q11. Which of the following contains a tree of domain names?
A. Domain name space
B. Domain name formulation
C. Domain Name System
D. Authoritative name server
Answer: A
Q12. The workstations on your network utilize Windows XP (service pack 2 or later). Many users take their laptops on the road. You are very concerned about the security and want to have a robust firewall solution for mobile users. You have decided that all your firewalls to use the Stateful Packet Inspection (SPI) method. What must you do to provide SPI to your mobile users?
A. You must purchase a third party firewall solution for your mobile users.
B. Do nothing. Windows XP service pack 2 has a firewall turned on by default.
C. Configure the Windows XP firewall to use SPI.
D. Download the SPI template from Microsoft.
Answer: A
Q13. A user has opened a Web site that automatically starts downloading malicious code onto his computer. What should he do to prevent this? Each correct answer represents a complete solution. Choose two.
A. Disable ActiveX Controls
B. Disable Active Scripting
C. Implement File Integrity Auditing
D. Configure Security Logs
Answer: AB
Q14. Which of the following functions are performed by a firewall? Each correct answer represents a complete solution. Choose all that apply.
A. It blocks unwanted traffic.
B. It hides vulnerable computers that are exposed to the Internet.
C. It enhances security through various methods, including packet filtering, circuit-level filtering, and application filtering.
D. It logs traffic to and from the private network.
Answer: ABCD
Q15. Which of the following is a Windows configuration option that enables administrators to restrict
communication among domain members only?
A. Demilitarized zone
B. Server isolation
C. Domain isolation
D. Domain kiting
Answer: C
Q16. Which of the following points has to be considered for using the BitLocker?
A. The deployment of antivirus because BitLocker needs a a removal of buffer overflow.
B. The deployment of SEAL because BitLocker needs an alternative encryption algorithm to software-based DES, 3DES, and AES. .
C. The deployment of hardware because BitLocker needs a system reserved partition.
D. The deployment of hard disk because BitLocker needs a bot.
Answer: C
Q17. All your domain controllers are configured for DHCP. Each time the system is booted, it gets a new IP address from the DHCP server. You had also configured the Active Directory on the domain controllers. You want to configure your DNS settings so that it will dynamically update DNS data whenever the IP address of a domain controller changes. How will you configure for dynamic updates?
A. Configure the DNS server for dynamic updates.
B. Configure the DHCP server for DNS dynamic updates.
C. Configure each domain controller for Dynamic update.
D. Configure the Active directory for dynamic updates.
Answer: B
Q18. Which of the following is a secret numeric password shared between a user and a system for authenticating the user to the system?
A. PIN
B. Private key
C. Key escrow
D. Public key
Answer: A
Q19. Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to implement a method to ensure that the mobile devices are in a good state of security health when they are trying to access the corporate network. Which of the following is a control or strategy that Mark will implement to assure the security health?
A. TCP/IP protocol
B. Kerberos
C. Single Sign On
D. Network Access Protection
Answer: D
Q20. Your Web server crashes at exactly the point where it reaches 1 million total visits. You discover the cause of the server crash is malicious code. Which description best fits this code?
A. Virus
B. Worm
C. Polymorphic Virus
D. Logic Bomb
Answer: D