♥♥ 2017 NEW RECOMMEND ♥♥
Free VCE & PDF File for Microsoft 98-367 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
It is impossible to pass Microsoft security fundamentals mta exam 98 367 exam without any help in the short term. Come to Actualtests soon and find the most advanced, correct and guaranteed Microsoft security fundamentals mta exam 98 367 practice questions. You will get a surprising result by our Update MTA Security Fundamentals Practice Test practice guides.
Q81. You work as a Network Administrator for TechMart Inc. The company has a Windows-based network. After completing a security audit of the company's Microsoft Windows Server 2008 R2 file servers, you have determined that folder and share security requires a revision on the basis of corporate reorganization. You have noticed that some shares on the file system are not secured. Which of the following is the default permission setting that you have used when a share is created?
A. Everyone with Change permission
B. Administrators with the Full Control permission
C. Administrators with the Change permission
D. Everyone with Read permission
Q82. Which of the following viruses cannot be detected by signature-based antivirus?
A. Macro virus
B. Boot sector virus
C. MBR virus
D. Polymorphic virus
Q83. Which of the following can be implemented to ensure that the computers are using latest security updates?
B. Windows Software Update Services
C. Microsoft Baseline Security Analyzer
D. Domain Name System
Q84. You work as a Network Administrator for NetTech Inc. Your computer has the Windows 2000 Server operating system. You want to harden the security of the server. Which of the following changes are required to accomplish this? Each correct answer represents a complete solution. Choose two.
A. Enable the Guest account.
B. Rename the Administrator account.
C. Remove the Administrator account.
D. Disable the Guest account.
Q85. You are responsible for virus protection for a large college campus. You are very concerned that your antivirus solution must be able to capture the latest virus threats. What sort of virus protection should you implement?
A. Network Based
B. Host based
Q86. Which of the following are the types of OS fingerprinting techniques? Each correct answer represents a complete solution. Choose two.
A. Passive fingerprinting
B. Active fingerprinting
C. Laser fingerprinting
D. Unidirectional fingerprinting
Q87. Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?
A. Static NAT
B. Port Address Translation (PAT)
C. Dynamic NAT
D. Cache NAT
Q88. Which of the following is the reason of properly securing an audit log?
A. To ensure that only authorized person can check the log file.
B. To ensure that no one can remove it as there is no back up is provided for this log.
C. To ensure that potential hackers becomes unable to delete the event logs for covering their tracks.
D. To ensure that potential hackers can be tracked easily without changing the network configuration.
Q89. Which of the following is the process used by attackers for listening to the network traffic?
Q90. Which of the following is the layer in which encryption and decryption of data takes place?
A. Presentation layer
B. Session layer
C. Physical layer
D. Data-link layer