Cause all that matters here is passing the Microsoft mta 98 367 exam. Cause all that you need is a high score of mta 98 367 MTA Security Fundamentals Practice Test exam. The only one thing you need to do is downloading Examcollection mta exam 98 367 exam study guides now. We will not let you down with our money-back guarantee.

Q9. Which of the following security features of IE 7+ helps determine whether a Web site is a legitimate site? 

A. Protected mode

B. Pop-up blocker 

C. Security zones 

D. Phishing filter 

Answer:


Q10. Mark works as a Network Administrator for BlueWell Inc. The company has a Windows-based network. Mark has retained his services to perform a security assessment of the company's network that has various servers exposed to the Internet. So, it may be vulnerable to an attack. Mark is using a single perimeter ?rewall, but he does not know if that is enough. He wants to review the situation and make some reliable recommendations so that he can protect the data over company's network. Which of the following will Mark do to accomplish the task? 

A. Outsource the related services. 

B. Encrypt the data and than start transmission. 

C. Locate the Internet-exposed servers and devices in an internal network. 

D. Create a perimeter network to isolate the servers from the internal network. 

Answer:


Q11. Which of the following is a security protocol that is used to protect data from being modified, corrupted, or accessed without authorization?

A. Honeypot

B. IP Security (IPsec)

C. DNSSEC

D. Protocol spoofing

Answer: B


Q12. Which of the following is often used for one-to-many communications using broadcast or multicast IP datagrams? 

A. UDP 

B. FTP 

C. HTTP 

D. SMTP 

Answer:


Q13. Which of the following is a use of Microsoft Windows Malicious Software Removal Tool? 

A. To gain unauthorized remote access to a computer and launch additional attacks. 

B. To distribute itself automatically from one computer to another via network connections. 

C. To remove the malware. 

D. To perform repetitive or time-consuming task on a network. 

Answer:


Q14. On which of the following is the level of security set for the local intranet zone applied? 

A. To the sites that might potentially damage your computer, or your information. 

B. To the Websites and content that are stored on a corporate, or business network. 

C. To the sites that you have specifically indicated as the ones that you trust. 

D. To all the Websites by default. 

Answer:


Q15. You work as a Network Administrator for TechMart Inc. The company has a Windows-based network. After completing a security audit of the company's Microsoft Windows Server 2008 R2 file servers, you have determined that folder and share security requires a revision on the basis of corporate reorganization. You have noticed that some shares on the file system are not secured. Which of the following will you use to prevent unauthorized changes to computers on the domain? 

A. TCP/IP protocol 

B. Kerberos 

C. User Account Control (UAC) 

D. Lightweight Directory Access Protocol 

Answer:


Q16. Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network. The company is adding an open, high-speed, wireless access for their customers and secured wireless for employees at all 37 branches. He wants to check the various security concerns for ensuring that business traffic is secured. He is also in under pressure to make this new feature a winning strategy for a company. Mark wants the employees to be free to troubleshoot their own wireless connections before contacting him. Which of the following is the basic troubleshooting step that he can ask them to do? 

A. To power cycle the wireless access points and then reboot the systems. 

B. To configure the network to use only Extensible Authentication Protocol (EAP). 

C. To reboot the computers they are using and then use the MAC filtering. 

D. To right-click the network icon in the system tray and then select Troubleshoot Problems. 

Answer: