Beginners Guide: mta 98 367

Ucertify offers free demo for security fundamentals mta exam 98 367 exam. "MTA Security Fundamentals Practice Test", also known as mta 98 367 exam, is a Microsoft Certification. This set of posts, Passing the Microsoft mta exam 98 367 exam, will help you answer those questions. The mta exam 98 367 Questions & Answers covers all the knowledge points of the real exam. 100% real Microsoft security fundamentals mta exam 98 367 exams and revised by experts!

Q1. Which of the following is a central, secure database in which Windows stores all hardware configuration information, software configuration information, and system security policies? 

A. Registry 

B. Program files folder 

C. DLL file 

D. Configuration file 


Q2. Which of the following is a use of Microsoft Windows Malicious Software Removal Tool? 

A. To gain unauthorized remote access to a computer and launch additional attacks. 

B. To distribute itself automatically from one computer to another via network connections. 

C. To remove the malware. 

D. To perform repetitive or time-consuming task on a network. 


Q3. Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network. The company is adding an open, high-speed, wireless access for their customers and secured wireless for employees at all 37 branches. He wants to check the various security concerns for ensuring that business traffic is secured. He is also under pressure to make this new feature a winning strategy for a company. 

In which of the following ways can Mark add another level of security after implanting encryption techniques for the business wireless traffic? Each correct answer represents a complete solution. Choose all that apply. 

A. Hide the Service Set Identifier (SSID) 

B. Configure the network to use only Extensible Authentication Protocol (EAP) 

C. Implement access point isolation and 

D. Use MAC filtering 

Answer: AC 

Q4. Which of the following states that a user should never be given more privileges than are required to

carry out a task?

A. Security through obscurity

B. Segregation of duties

C. Principle of least privilege

D. Role-based security


Q5. Which of the following tools traces all or specific activities of a user on a computer?

A. Task Manager

B. Event Viewer

C. Network Monitor

D. Keylogger

Answer: D

Q6. You have configured a virtualized Internet browser on your Windows XP professional computer. Using the virtualized Internet browser, you can protect your operating system from which of the following? 

A. Brute force attack 

B. Distributed denial of service (DDOS) attack 

C. Mail bombing 

D. Malware installation from unknown Web sites 


Q7. Which of the following viruses cannot be detected by signature-based antivirus?

A. Macro virus

B. Boot sector virus

C. MBR virus

D. Polymorphic virus


Q8. In which of the following is the file audit events are written when auditing is enabled? 

A. File system ACL 

B. Biometric device 

C. Network Access Control List 

D. Security event log 


Q9. Which of the following MMC snap-in consoles is used to administer the replication of directory data among all sites in an Active Directory Domain Services (AD DS) forest? 

A. Active Directory Domains and Trusts

B. Active Directory Administrative Center 

C. Group Policy Management Console 

D. Active Directory Sites and Services 


Q10. Which of the following can search contents of a hard disk, address book of an e-mail, or any information about the computer, and transmit the information to the advertisers or other interested parties without user knowledge? 

A. Malware 

B. Firmware 

C. Spyware 

D. Adware 


Microsoft 98-367 Certification Sample Questions and Answers:

P.S. New 98-367 dumps PDF: