Realistic of 98-367 rapidshare materials and resource for Microsoft certification for client, Real Success Guaranteed with Updated 98-367 pdf dumps vce Materials. 100% PASS MTA Security Fundamentals Practice Test exam Today!
Q21. Which of the following helps prevent security failures?
A. Social engineering
B. Denial-of-Service attack
C. Attack surface reduction
D. Snooping
Answer: C
Q22. You have bought a Windows Vista Enterprise Edition computer. You want to enable BitLocker encryption through the Control Panel. In the Startup Preference dialog box, choose the startup options that can be selected if the computer has a built-in TPM chip.
Answer:
Q23. Which of the following is the process used by attackers for listening to the network traffic?
A. Eavesdropping
B. Subnetting
C. Sanitization
D. Hacking
Answer: A
Q24. Mark works as a Security Officer for TechMart Inc. The company has a Windows-based network. He has bees assigned a project for ensuring the safety of the customer's money and information, not to mention the company's reputation. The company has gone through a security audit to ensure that it is in compliance with industry regulations and standards. Mark understands the request and has to do his due diligence for providing any information the regulators require as they are targeting potential security holes. In this situation, his major concern is the physical security of his company's system. Which of the following actions will Mark take to prevent the use of key loggers in the company?
A. Provide protection against a Distributed Denial of Services attack.
B. Call a team member while behaving to be someone else for gaining access to sensitive information.
C. Ensure that the terminals are locked and perform a regular inspection of the ports on the systems.
D. Develop a social awareness of security threats within an organization.
Answer: C
Q25. You work as a Network Administrator for TechMart Inc. The company has a Windows-based network. After completing a security audit of the company's Microsoft Windows Server 2008 R2 file servers, you have determined that folder and share security requires a revision on the basis of corporate reorganization. You have noticed that some shares on the file system are not secured. Which of the following will you use to prevent unauthorized changes to computers on the domain?
A. TCP/IP protocol
B. Kerberos
C. User Account Control (UAC)
D. Lightweight Directory Access Protocol
Answer: C
Q26. Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?
A. Static NAT
B. Port Address Translation (PAT)
C. Dynamic NAT
D. Cache NAT
Answer: C
Q27. A user has opened a Web site that automatically starts downloading malicious code onto his computer. What should he do to prevent this? Each correct answer represents a complete solution. Choose two.
A. Disable ActiveX Controls
B. Disable Active Scripting
C. Implement File Integrity Auditing
D. Configure Security Logs
Answer: AB
Q28. You work as a Network Administrator for Tech Perfect Inc. The company has a Windows 2008 Active Directory-based network. All client computers on the network run Windows Vista Ultimate. You have configured a Dynamic DNS (DDNS) on the network. There are a lot of mobile users who often connect to and disconnect from the network. Users on the network complain of slow network responses. You suspect that the stale records on the DNS server may be the cause of the issue. You want to remove the stale records.Which of the following technologies will you use to accomplish the task?
A. RODC
B. Aging
C. Scavenging
D. Forwarding
Answer: C
Q29. Which of the following infects the computer and then hides itself from detection by antivirus software?
A. EICAR virus
B. Boot-sector virus
C. Macro virus
D. Stealth virus
Answer: D
Q30. Which of following is required to be configured to ensure that the Bitlocker storage can be reclaimed?
A. BitLocker to use data recovery agents
B. BitLocker to use the password screen saver
C. BitLocker to use the Secret Retrieval Agent
D. BitLocker to use the Artificial Intelligence recovery option.
Answer: A