Microsoft 98-367 ExamMTA Security Fundamentals Practice Test

Total Question: 123 Last Updated: January 15,2018
  • Updated 98-367 Dumps
  • Based on Real 98-367 Exams Scenarios
  • Free 98-367 pdf Demo Available
  • Check out our 98-367 Dumps in a new PDF format
  • Instant 98-367 download
  • Guarantee 98-367 success in first attempt
Package Select:

Questions & Answers PDF

Practice Test Software

Practice Test + PDF 30% Discount

Price: $65.95 $29.99

Buy Now Free Trial

Tactics to mta 98 367

Cause all that matters here is passing the Microsoft mta 98 367 exam. Cause all that you need is a high score of mta exam 98 367 MTA Security Fundamentals Practice Test exam. The only one thing you need to do is downloading Testking mta exam 98 367 exam study guides now. We will not let you down with our money-back guarantee.

Q41. Which of the following functions are performed by a firewall? Each correct answer represents a complete solution. Choose all that apply. 

A. It blocks unwanted traffic. 

B. It hides vulnerable computers that are exposed to the Internet. 

C. It enhances security through various methods, including packet filtering, circuit-level filtering, and application filtering. 

D. It logs traffic to and from the private network. 

Answer: ABCD 


Q42. Which of the following are the Internet Explorer security zones? Each correct answer represents a complete solution. Choose three. 

A. Trusted sites 

B. Internet 

C. Local intranet 

D. Extranet 

Answer: ABC 


Q43. Mark works as a Security Officer for TechMart Inc. The company has a Windows-based network. He has bees assigned a project for ensuring the safety of the customer's money and information, not to mention the company's reputation. The company has gone through a security audit to ensure that it is in compliance with industry regulations and standards. Mark understands the request and has to do his due diligence for providing any information the regulators require as they are targeting potential security holes. In this situation, his major concern is the physical security of his company's system. Which of the following actions will Mark take to ensure the physical security of the company's desktop computers? 

A. Call a team member while behaving to be someone else for gaining access to sensitive information. 

B. Develop a social awareness of security threats within an organization. 

C. Use group policies to disable the use of floppy drives or USB drives. 

D. Provide protection against a Distributed Denial of Services attack. 

Answer:


Q44. Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network. The company is adding an open, high-speed, wireless access for their customers and secured wireless for employees at all 37 branches. He wants to check the various security concerns for ensuring that business traffic is secured. He is also under pressure to make this new feature a winning strategy for a company. Which of the following is the most secure protocol that Mark can implement to ensure that the business-related traffic is encrypted?

A. WiFi Protected Access (WPA) 2

B. Extensible Authentication Protocol (EAP)

C. Wired Equivalent Privacy (WEP)

D. Service Set Identifiers

Answer: A


Q45. Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to implement stronger authentication measures for the customers, as well as eliminate IT staff from logging on with high privileges. Mark has various options, but he is required to keep the processes easy for the helpdesk staff. Which of the following is a service can the staff uses as an alternative of signing in with elevate privileges? 

A. Secondary Logon-Run As 

B. Security log 

C. Hardware firewall 

D. Encrypted network configuration 

Answer:


Q46. Which of the following is a process in which data is changed before or while it is entered into a computer system? 

A. Data diddling 

B. Authentication 

C. Domain kiting 

D. Packet sniffing 

Answer:


Q47. Mark works as a Network Administrator for BlueWell Inc. The company has a Windows-based network. Mark has retained his services to perform a security assessment of the company's network that has various servers exposed to the Internet. So, it may be vulnerable to an attack. Mark is using a single perimeter ?rewall, but he does not know if that is enough. He wants to review the situation and make some reliable recommendations so that he can protect the data over company's network. Which of the following will Mark do to accomplish the task? 

A. Outsource the related services. 

B. Encrypt the data and than start transmission. 

C. Locate the Internet-exposed servers and devices in an internal network. 

D. Create a perimeter network to isolate the servers from the internal network. 

Answer:


Q48. Which of the following refers to a security access control methodology whereby the 48-bit address is assigned to each network card which is used to determine access to the network?

A. Snooping

B. Spoofing

C. Encapsulation

D. MAC filtering

Answer: D


Q49. Which of the following is often used for one-to-many communications using broadcast or multicast IP datagrams? 

A. UDP 

B. FTP 

C. HTTP 

D. SMTP 

Answer:


Q50. You want to standardize security throughout your network. You primarily use Microsoft operating systems for servers and workstations. What is the best way to have standardized security (i.e. same password policies, lockout policies, etc.) throughout the network on clients and servers? 

A. Publish the desired policies to all employees directing them to implement according to policy. 

B. Configure each computer to adhere to the standard policies. 

C. When installing new workstations or servers, image a machine that has proper security settings and install the new machine with that image. 

D. Utilize Windows Security Templates for all computers. 

Answer:


Related 98-367 Articles