Proper study guides for Up to the minute Microsoft MTA Security Fundamentals Practice Test certified begins with Microsoft mta exam 98 367 preparation products which designed to deliver the Pinpoint mta exam 98 367 questions by making you pass the mta exam 98 367 test at your first time. Try the free security fundamentals mta exam 98 367 demo right now.
Q31. Mark works as a Desktop Administrator for TechMart Inc. The company has a Windows-based network. He has bees assigned a project to upgrade the browsers to Internet Explorer (IE) 8 for working with the latest Internet technologies Mark wants to ensure that the company uses a number of the security features built into the browser while maintaining functionality within the company's intranet. Mark is also educating his users to be good Internet citizens and use the safe web sur?ng. Mark asked his team to be assured that they are on a secured website. What they will do?
A. Take a look for a padlock in the lower right corner of the browser and https:// in the address bar.
B. Provide protection against a Distributed Denial of Services attack.
C. Call a team member while behaving to be someone else for gaining access to sensitive information.
D. Go into the Internet Options, select the Security, and add the intranet site to the list of Local Intranet Site.
Answer: A
Q32. You are taking over the security of an existing network. You discover a machine that is not being used as such, but has software on it that emulates the activity of a sensitive database server. What is this?
A. A Polymorphic Virus
B. A Honey Pot
C. A reactive IDS.
D. A Virus
Answer: B
Q33. Which of the following can search contents of a hard disk, address book of an e-mail, or any information about the computer, and transmit the information to the advertisers or other interested parties without user knowledge?
A. Malware
B. Firmware
C. Spyware
D. Adware
Answer: C
Q34. You work as a Network Administrator for NetTech Inc. Your computer has the Windows 2000 Server operating system. You want to harden the security of the server. Which of the following changes are required to accomplish this? Each correct answer represents a complete solution. Choose two.
A. Enable the Guest account.
B. Rename the Administrator account.
C. Remove the Administrator account.
D. Disable the Guest account.
Answer: BD
Q35. Which of the following uses a symmetric encryption algorithm that takes a lesser amount of time to encrypt or decrypt large amounts of data.
A. BitLocker
B. SSID
C. BitLocker To Go
D. EFS
Answer: D
Q36. Which of the following is a process in which data is changed before or while it is entered into a computer system?
A. Data diddling
B. Authentication
C. Domain kiting
D. Packet sniffing
Answer: A
Q37. Which of the following is a use of Microsoft Windows Malicious Software Removal Tool?
A. To gain unauthorized remote access to a computer and launch additional attacks.
B. To distribute itself automatically from one computer to another via network connections.
C. To remove the malware.
D. To perform repetitive or time-consuming task on a network.
Answer: C
Q38. Which of the following can be implemented to decrease the number of times a user is required to be authenticated for access a particular resource?
A. TCP/IP protocol
B. Network Directory Access Protocol
C. Kerberos
D. Single Sign-on (SSO)
Answer: D
Q39. Which of the following actions should be taken so that the computer requires confirmation before installing an ActiveX component?
A. Configuring a firewall on the network
B. Configuring the settings on the Web Browser
C. Installing an anti-virus software
D. Configuring DMZ on the network
Answer: B
Q40. Which of the following protects against unauthorized access to confidential information via encryption and works at the network layer?
A. Firewall
B. NAT
C. IPSec
D. MAC address
Answer: C