It is more faster and easier to pass the Microsoft security fundamentals mta exam 98 367 exam by using Actual Microsoft MTA Security Fundamentals Practice Test questuins and answers. Immediate access to the Improved security fundamentals mta exam 98 367 Exam and find the same core area security fundamentals mta exam 98 367 questions with professionally verified answers, then PASS your exam with a high score now.
2017 NEW RECOMMEND
Free VCE & PDF File for Microsoft 98-367 Real Exam
Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions
Q21. Which of the following are the types of OS fingerprinting techniques? Each correct answer represents a complete solution. Choose two.
A. Passive fingerprinting
B. Active fingerprinting
C. Laser fingerprinting
D. Unidirectional fingerprinting
Q22. Which of the following protocols is used to secure workstation and computer authentication across the network?
B. Network Directory Access Protocol
D. Lightweight Directory Access Protocol
Q23. Which of the following is a service can be enabled to ensure that the servers are able to receive all essential software updates?
A. Windows Software Update Services
B. Read-Only domain controller (RODC)
C. Microsoft Baseline Security Analyzer
D. DNS dynamic update
Q24. Mark works as a Network Administrator for BlueWell Inc. The company has a Windows-based network. Mark has retained his services to perform a security assessment of the company's network that has various servers exposed to the Internet. So, it may be vulnerable to an attack. Mark is using a single perimeter ?rewall, but he does not know if that is enough. He wants to review the situation and make some reliable recommendations so that he can protect the data over company's network. Which of the following will Mark use to inspect network information on the basis of source and destination address?
A. Stateless packet inspection
B. Tricky packet inspection
C. Stateful packet inspection
D. Reaction based packet inspection
Q25. You check the logs on several clients and find that there is traffic coming in on an odd port (port 1872). All clients have the Windows XP firewall turned on. What should you do to block this unwanted traffic?
A. Perform a virus scan to find the virus responsible for this traffic.
B. Check the exceptions in the firewall and unselect that port exception.
C. Trace back that traffic and find its origin.
D. Shut down the service that connects to that port.
Q26. Which of the following are the major components of the IPsec protocol? Each correct answer represents a complete solution. Choose all that apply.
A. Encapsulating Security Payload (ESP)
B. Authentication Header (AH)
C. Internet Encryption Key (IEK)
D. Internet Key Exchange (IKE)
Q27. Which of the following areas of a network contains DNS servers and Web servers for Internet users?
Q28. You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008
network environment. The network is configured as a Windows Active Directory-based single forest
single domain network. You want to configure Network Access Protection (NAP) on your network.
You want that the clients connecting to the network must contain certain configurations. Which of
the following Windows components ensure that only clients having certain health benchmarks
access the network resources? Each correct answer represents a part of the solution. Choose two.
A. Windows Firewall
B. System Health Agents (SHA)
C. Terminal Service
D. System Health Validators (SHV)
E. TS Gateway
Q29. Which of the following is the layer in which encryption and decryption of data takes place?
A. Presentation layer
B. Session layer
C. Physical layer
D. Data-link layer
Q30. Which of the following helps prevent security failures?
A. Social engineering
B. Denial-of-Service attack
C. Attack surface reduction