Proper study guides for Avant-garde Microsoft MTA Security Fundamentals Practice Test certified begins with Microsoft 98-367 preparation products which designed to deliver the Highest Quality 98-367 questions by making you pass the 98-367 test at your first time. Try the free 98-367 demo right now.
Q41. Which of the following is a attack type that is used to poison a network or computer to the point where the system is turned into unusable state?
A. Mail bombing
B. Pharming
C. Protocol spoofing
D. Denial of service (DOS)
Answer: D
Q42. Which of the following terms refers to the access of a wireless Internet connection by bringing one's own computer within the range of another's wireless connection, and using that service without the subscriber's explicit permission or knowledge?
A. Samhain
B. Snooping
C. Piggybacking
D. Vampire tap
Answer: C
Q43. Which of the following is a process in which data is changed before or while it is entered into a computer system?
A. Data diddling
B. Authentication
C. Domain kiting
D. Packet sniffing
Answer: A
Q44. On which of the following is the level of security set for an Internet zone applied?
A. To the sites that you have specifically indicated as the ones that you trust.
B. To all the Websites by default.
C. To the sites that might potentially damage your computer, or your information.
D. To the Websites and content that are stored on a corporate or business network.
Answer: B
Q45. Which of the following is the process of keeping track of a user's activity while accessing network resources?
A. Authentication
B. Auditing
C. Spoofing
D. Biometrics
Answer: B
Q46. Which of the following is a secret numeric password shared between a user and a system for authenticating the user to the system?
A. PIN
B. Private key
C. Key escrow
D. Public key
Answer: A
Q47. Which of the following is a Windows configuration option that enables administrators to restrict
communication among domain members only?
A. Demilitarized zone
B. Server isolation
C. Domain isolation
D. Domain kiting
Answer: C
Q48. Which of the following contains a tree of domain names?
A. Domain name space
B. Domain name formulation
C. Domain Name System
D. Authoritative name server
Answer: A
Q49. You work as a Network Administrator for TechMart Inc. The company has a Windows-based network. After completing a security audit of the company's Microsoft Windows Server 2008 R2 file servers, you have determined that folder and share security requires a revision on the basis of corporate reorganization. You have noticed that some shares on the file system are not secured. Which of the following is a feature that you will use to reassign permissions without assigning permissions to every parent and child folder?
A. Inheritance
B. Kerberos
C. TCP/IP protocol
D. User Account Control (UAC)
Answer: A
Q50. Which of the following is an authentication protocol?
A. Kerberos
B. LDAP
C. TLS
D. PPTP
Answer: A