getcertified4sure.com

Super to mta 98 367




Master the mta 98 367 MTA Security Fundamentals Practice Test content and be ready for exam day success quickly with this Exambible mta 98 367 braindumps. We guarantee it!We make it a reality and give you real security fundamentals mta exam 98 367 questions in our Microsoft security fundamentals mta exam 98 367 braindumps.Latest 100% VALID Microsoft mta exam 98 367 Exam Questions Dumps at below page. You can use our Microsoft mta exam 98 367 braindumps and pass your exam.

Q21. Which of the following is a central, secure database in which Windows stores all hardware configuration information, software configuration information, and system security policies? 

A. Registry 

B. Program files folder 

C. DLL file 

D. Configuration file 

Answer:


Q22. Which of the following is a program that runs at a specific date and time to cause unwanted and unauthorized functions? 

A. Keylogger 

B. Logic bomb 

C. Spyware 

D. Trojan horse 

Answer:


Q23. You check the logs on several clients and find that there is traffic coming in on an odd port (port 1872). All clients have the Windows XP firewall turned on. What should you do to block this unwanted traffic? 

A. Perform a virus scan to find the virus responsible for this traffic. 

B. Check the exceptions in the firewall and unselect that port exception. 

C. Trace back that traffic and find its origin. 

D. Shut down the service that connects to that port. 

Answer:


Q24. Which of the following are types of password policies of Windows 7? Each correct answer represents a complete solution. Choose all that apply. 

A. Store Password Using Reversible Encryption 

B. Minimum Password Length 

C. User Name Length 

D. Password Must Meet Complexity Requirements 

Answer: ABD 


Q25. Which of the following is a mechanism that allows authentication of dial-in and other network connections? 

A. VPN 

B. NTFS 

C. RADIUS 

D. Single Sign-On 

Answer:


Q26. Which of the following applications captures network packets as they traverse a network and displays them to the attacker? 

A. Keylogger 

B. Sniffer 

C. Key fob 

D. Protocol analyzer 

Answer:


Q27. Which of the following ports is used by the IMAP4 protocol? 

A. 443 

B. 53 

C. 143 

D. 110 

Answer:


Q28. Which of the following is a security protocol that is used to protect data from being modified, corrupted, or accessed without authorization?

A. Honeypot

B. IP Security (IPsec)

C. DNSSEC

D. Protocol spoofing

Answer: B


Q29. Which of the following is a secret numeric password shared between a user and a system for authenticating the user to the system? 

A. Key escrow

B. Public key 

C. Private key 

D. PIN 

Answer:


Q30. Which of the following is an organization that defines standards for anti-virus software? 

A. ICSA

B. IETF 

C. IIS 

D. IEEE 

Answer: