Master the mta 98 367 MTA Security Fundamentals Practice Test content and be ready for exam day success quickly with this Actualtests security fundamentals mta exam 98 367 free exam. We guarantee it!We make it a reality and give you real security fundamentals mta exam 98 367 questions in our Microsoft mta exam 98 367 braindumps.Latest 100% VALID Microsoft mta 98 367 Exam Questions Dumps at below page. You can use our Microsoft mta exam 98 367 braindumps and pass your exam.

Q1. Ron owns the domain TechPerfect.net. He often receives bounces about messages he didn't send. After looking at all such mails, he is sure that someone is spamming e-mails and using his domain name. What will Ron do to ensure that his domain name is not exploited? 

A. Publish the MX record for the domain. 

B. Publish the SPF record for the domain. 

C. Publish the AAAA record for the domain. 

D. Publish the A record for the domain. 

Answer:


Q2. All your domain controllers are configured for DHCP. Each time the system is booted, it gets a new IP address from the DHCP server. You had also configured the Active Directory on the domain controllers. You want to configure your DNS settings so that it will dynamically update DNS data whenever the IP address of a domain controller changes. How will you configure for dynamic updates? 

A. Configure the DNS server for dynamic updates. 

B. Configure the DHCP server for DNS dynamic updates. 

C. Configure each domain controller for Dynamic update. 

D. Configure the Active directory for dynamic updates. 

Answer:


Q3. Which of the following is method that can be used to identify Internet software in Software Restriction Policies? 

A. Restriction rule 

B. Identification rule 

C. Internet rule 

D. Zone rule 

Answer:


Q4. You work as a network administrator for an insurance company called InZed Inc. The company has developed a corporate policy that requires all machines to use the IPSec security protocol. If the computer they are logging in from does not follow this corporate policy, they will be denied access to the network. Which of the following can you set up to help enforce the corporate policy? 

A. Server Access Protection 

B. System Center Data Protection Manager (DPM) 

C. Microsoft Assessment and Planning (MAP) Toolkit 

D. Network Access Protection 

Answer:


Q5. Which of the following is a program that runs at a specific date and time to cause unwanted and unauthorized functions? 

A. Keylogger 

B. Logic bomb 

C. Spyware 

D. Trojan horse 

Answer:


Q6. Which of the following viruses cannot be detected by the signature-based antivirus? 

A. Polymorphic 

B. MBR virus 

C. Boot sector 

D. Macro 

Answer:


Q7. Which of the following protects against unauthorized access to confidential information via encryption and works at the network layer?

A. Firewall

B. NAT 

C. IPSec 

D. MAC address 

Answer:


Q8. Mark work as a System Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to allow the remote travel agents to be able to access the corporate network so that they are free to check email and post appointments that are booked for the particular day.

Mark has decided to permit the travel agents to use their home computers but he is required to be assured that the information is not compromised by anyone because the security of client information is on the top priority for him. Which of the following is a potential risk if the travel agents will use their home computers for VPN access?

A. VPN handles everything and encrypts the data.

B. VPN does not allow the travel agents to use their home computers.

C. VPN cannot prevent buffer overflow on the home computer from infecting the network.

D. VPN cannot prevent potential viruses and malware on the home computer from infecting the network.

Answer: D