Master the mta 98 367 MTA Security Fundamentals Practice Test content and be ready for exam day success quickly with this Examcollection security fundamentals mta exam 98 367 practice exam. We guarantee it!We make it a reality and give you real mta 98 367 questions in our Microsoft mta 98 367 braindumps.Latest 100% VALID Microsoft mta 98 367 Exam Questions Dumps at below page. You can use our Microsoft security fundamentals mta exam 98 367 braindumps and pass your exam.
Q41. Which of the following security features of IE 7+ makes it more difficult for malware to be installed?
A. Security zones
B. Phishing filter
C. Protected mode
D. Pop-up blocker
Q42. Which of the following viruses infects Word 97 documents and the NORMAL.DOT file of Word 97 and Word 2000?
Q43. Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to implement stronger authentication measures for the customers, as well as eliminate IT staff from logging on with high privileges. Mark has various options, but he is required to keep the processes easy for the helpdesk staff. Which of the following is a service can the staff uses as an alternative of signing in with elevate privileges?
A. Secondary Logon-Run As
B. Security log
C. Hardware firewall
D. Encrypted network configuration
Q44. Which of the following can be installed for ensuring that the domain is secure in the remote locations?
A. Read-Only domain controller (RODC)
B. Microsoft Baseline Security Analyzer
C. Windows Software Update Services
D. DNS dynamic update
Q45. Which of the following is the process of keeping track of a user's activity while accessing network resources?
Q46. Which of the following can be used to implement two-factor authentications? Each correct answer represents a complete solution. Choose all that apply.
A. Firewall security rule
C. Smart card
D. Encrypted network configuration
Q47. Which of the following is the edge between the private and locally managed-and-owned side of a network and the public side that is commonly managed by a service provider?
B. Network perimeter
Q48. Which of the following are types of password policies of Windows 7? Each correct answer represents a complete solution. Choose all that apply.
A. Store Password Using Reversible Encryption
B. Minimum Password Length
C. User Name Length
D. Password Must Meet Complexity Requirements
Q49. Which of the following is a secret numeric password shared between a user and a system for authenticating the user to the system?
A. Key escrow
B. Public key
C. Private key
Q50. Mark work as a System Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to allow the remote travel agents to be able to access the corporate network so that they are free to check email and post appointments that are booked for the particular day. Mark has decided to permit the travel agents to use their home computers but he is required to be assured that the information is not compromised by anyone because the security of client information is on the top priority for him. Which of the following will Mark use to accomplish the task?
A. Implement the principle of least privilege that permits the travel agents for remote access.
B. Implement a Wi-Fi Protected Access that permits the travel agents for remote access.
C. Implement a Wired Equivalent Privacy that permits the travel agents for remote access.
D. Implement a VPN server that permits the travel agents for remote access.
To know more about the 98-367, click here.