Amazing mta 98 367 To Try

Your success in Microsoft mta exam 98 367 is our sole target and we develop all our mta 98 367 braindumps in a way that facilitates the attainment of this target. Not only is our mta 98 367 study material the best you can find, it is also the most detailed and the most updated. mta 98 367 Practice Exams for Microsoft MTA mta 98 367 are written to the highest standards of technical accuracy.

2017 NEW RECOMMEND

Free VCE & PDF File for Microsoft 98-367 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW 98-367 Exam Dumps (PDF & VCE):
Available on:
http://www.certleader.com/98-367-dumps.html

Q1. You work as an Exchange Administrator for TechWorld Inc. The company has a Windows 2008 Active Directory-based network. The network contains an Exchange Server 2010 organization. You are in the process of choosing an authentication method for Exchange ActiveSync. You need an authentication method that requires both, a password and an external device. Which of the following authentication methods will you choose for Exchange ActiveSync? 

A. Device-based authentication 

B. Basic authentication 

C. Certificate-based authentication 

D. Token-based authentication 

Answer:

Q2. Which of the following are the uses of Network Access Protection (NAP)? 

Each correct answer represents a complete solution. Choose all that apply. 

A. It is used to protect against virus. 

B. It is used to verify the complete integrity of each device. 

C. It permits a user to access all computers and systems where he got a access permission, without entering passwords for multiple times 

D. It is used to authenticate a request for a service in a computer network. 

Answer: AB 

Q3. Which of the following is an organization that defines standards for anti-virus software? 

A. ICSA

B. IETF 

C. IIS 

D. IEEE 

Answer:

Q4. Which of the following works at the network layer and hides the local area network IP address and topology?

A. Network address translation (NAT) 

B. MAC address 

C. Hub 

D. Network interface card (NIC) 

Answer:

Q5. Which of the following is a attack type that is used to poison a network or computer to the point where the system is turned into unusable state? 

A. Mail bombing 

B. Pharming 

C. Protocol spoofing 

D. Denial of service (DOS) 

Answer:

Q6. Which of the following viruses infects Word 97 documents and the NORMAL.DOT file of Word 97 and Word 2000? 

A. Chernobyl 

B. Brain 

C. EICAR 

D. Melissa 

Answer:

Q7. Which of the following security features of IE 7+ makes it more difficult for malware to be installed? 

A. Security zones 

B. Phishing filter 

C. Protected mode 

D. Pop-up blocker 

Answer:

Q8. Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?

A. Static NAT

B. Port Address Translation (PAT)

C. Dynamic NAT

D. Cache NAT

Answer: C

Q9. Which of the following is a disadvantage of using biometric identification?

A. It breaks the several firewall security rules.

B. It needs a new network configuration of the entire infrastructure.

C. It can be faked and will not be trusted by several organizations.

D. It is expensive and cannot be afforded by several organizations

Answer: D

Q10. Mark works as a Security Officer for TechMart Inc. The company has a Windows-based network. He has bees assigned a project for ensuring the safety of the customer's money and information, not to mention the company's reputation. The company has gone through a security audit to ensure that it is in compliance with industry regulations and standards. Mark understands the request and has to do his due diligence for providing any information the regulators require as they are targeting potential security holes. In this situation, his major concern is the physical security of his company's system. Which of the following actions will Mark take to prevent the use of key loggers in the company? 

A. Provide protection against a Distributed Denial of Services attack. 

B. Call a team member while behaving to be someone else for gaining access to sensitive information. 

C. Ensure that the terminals are locked and perform a regular inspection of the ports on the systems. 

D. Develop a social awareness of security threats within an organization. 

Answer: