Act now and download your Microsoft mta exam 98 367 test today! Do not waste time for the worthless Microsoft mta 98 367 tutorials. Download Leading Microsoft MTA Security Fundamentals Practice Test exam with real questions and answers and begin to learn Microsoft mta exam 98 367 with a classic professional.
Q41. On which of the following is the level of security set for the restricted sites applied?
A. To the sites that might potentially damage your computer, or your information.
B. To the sites that you have specifically indicated as the ones that you trust.
C. To the Websites and content that are stored on a corporate or business network.
D. To all the Websites by default.
Q42. All your domain controllers are configured for DHCP. Each time the system is booted, it gets a new IP address from the DHCP server. You had also configured the Active Directory on the domain controllers. You want to configure your DNS settings so that it will dynamically update DNS data whenever the IP address of a domain controller changes. How will you configure for dynamic updates?
A. Configure the DNS server for dynamic updates.
B. Configure the DHCP server for DNS dynamic updates.
C. Configure each domain controller for Dynamic update.
D. Configure the Active directory for dynamic updates.
Q43. Which of the following is an authentication protocol?
Q44. Mark works as a Security Officer for TechMart Inc. The company has a Windows-based network. He has bees assigned a project for ensuring the safety of the customer's money and information, not to mention the company's reputation. The company has gone through a security audit to ensure that it is in compliance with industry regulations and standards. Mark understands the request and has to do his due diligence for providing any information the regulators require as they are targeting potential security holes. In this situation, his major concern is the physical security of his company's system. Which of the following actions will Mark take to ensure the physical security of the company's desktop computers?
A. Call a team member while behaving to be someone else for gaining access to sensitive information.
B. Develop a social awareness of security threats within an organization.
C. Use group policies to disable the use of floppy drives or USB drives.
D. Provide protection against a Distributed Denial of Services attack.
Q45. Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network. The company is adding an open, high-speed, wireless access for their customers and secured wireless for employees at all 37 branches. He wants to check the various security concerns for ensuring that business traffic is secured. He is also under pressure to make this new feature a winning strategy for a company. Which of the following is the most secure protocol that Mark can implement to ensure that the business-related traffic is encrypted?
A. WiFi Protected Access (WPA) 2
B. Extensible Authentication Protocol (EAP)
C. Wired Equivalent Privacy (WEP)
D. Service Set Identifiers
Q46. Which of the following is defined as a digitally signed statement used to authenticate and to secure information on open networks?
B. Public certificate
C. Single sign-on (SSO)
Q47. Which of the following is a set of rules that control the working environment of user accounts and computer accounts?
A. Mandatory Access Control
B. Access control list
C. Group Policy
D. Intrusion detection system
Q48. Which of the following works at the network layer and hides the local area network IP address and topology?
A. Network address translation (NAT)
B. MAC address
D. Network interface card (NIC)
Q49. Which of the following is a collection or list of user accounts or computer accounts?
B. Active Directory
D. Public folder
Q50. Which of the following is a name that identifies a particular 802.11 wireless LAN?
Microsoft 98-367 Certification Sample Questions and Answers: https://www.braindumpsall.net/98-367-dumps/
P.S. New 98-367 dumps PDF: http://www.4easydumps.com/98-367-dumps-download.html