Key benefits of mta 98 367

It is more faster and easier to pass the Microsoft security fundamentals mta exam 98 367 exam by using Actual Microsoft MTA Security Fundamentals Practice Test questuins and answers. Immediate access to the Improved security fundamentals mta exam 98 367 Exam and find the same core area security fundamentals mta exam 98 367 questions with professionally verified answers, then PASS your exam with a high score now.


Free VCE & PDF File for Microsoft 98-367 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW 98-367 Exam Dumps (PDF & VCE):
Available on:

Q21. Which of the following are the types of OS fingerprinting techniques? Each correct answer represents a complete solution. Choose two. 

A. Passive fingerprinting 

B. Active fingerprinting 

C. Laser fingerprinting 

D. Unidirectional fingerprinting 

Answer: AB 

Q22. Which of the following protocols is used to secure workstation and computer authentication across the network? 


B. Network Directory Access Protocol 

C. Kerberos 

D. Lightweight Directory Access Protocol 


Q23. Which of the following is a service can be enabled to ensure that the servers are able to receive all essential software updates? 

A. Windows Software Update Services 

B. Read-Only domain controller (RODC) 

C. Microsoft Baseline Security Analyzer 

D. DNS dynamic update 


Q24. Mark works as a Network Administrator for BlueWell Inc. The company has a Windows-based network. Mark has retained his services to perform a security assessment of the company's network that has various servers exposed to the Internet. So, it may be vulnerable to an attack. Mark is using a single perimeter ?rewall, but he does not know if that is enough. He wants to review the situation and make some reliable recommendations so that he can protect the data over company's network. Which of the following will Mark use to inspect network information on the basis of source and destination address? 

A. Stateless packet inspection 

B. Tricky packet inspection 

C. Stateful packet inspection 

D. Reaction based packet inspection 


Q25. You check the logs on several clients and find that there is traffic coming in on an odd port (port 1872). All clients have the Windows XP firewall turned on. What should you do to block this unwanted traffic? 

A. Perform a virus scan to find the virus responsible for this traffic. 

B. Check the exceptions in the firewall and unselect that port exception. 

C. Trace back that traffic and find its origin. 

D. Shut down the service that connects to that port. 


Q26. Which of the following are the major components of the IPsec protocol? Each correct answer represents a complete solution. Choose all that apply. 

A. Encapsulating Security Payload (ESP) 

B. Authentication Header (AH) 

C. Internet Encryption Key (IEK) 

D. Internet Key Exchange (IKE) 

Answer: ABD 

Q27. Which of the following areas of a network contains DNS servers and Web servers for Internet users? 






Q28. You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008

network environment. The network is configured as a Windows Active Directory-based single forest

single domain network. You want to configure Network Access Protection (NAP) on your network.

You want that the clients connecting to the network must contain certain configurations. Which of

the following Windows components ensure that only clients having certain health benchmarks

access the network resources? Each correct answer represents a part of the solution. Choose two.

A. Windows Firewall

B. System Health Agents (SHA)

C. Terminal Service

D. System Health Validators (SHV)

E. TS Gateway

Answer: BD 

Q29. Which of the following is the layer in which encryption and decryption of data takes place? 

A. Presentation layer

B. Session layer 

C. Physical layer 

D. Data-link layer 


Q30. Which of the following helps prevent security failures? 

A. Social engineering 

B. Denial-of-Service attack 

C. Attack surface reduction 

D. Snooping