★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 98-367 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/98-367-dumps.html


Our pass rate is high to 98.9% and the similarity percentage between our mta 98 367 study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Microsoft mta exam 98 367 exam in just one try? I am currently studying for the Microsoft security fundamentals mta exam 98 367 exam. Latest Microsoft mta exam 98 367 Test exam practice questions and answers, Try Microsoft mta 98 367 Brain Dumps First.

Q1. Which of the following security features of IE 7+ makes it more difficult for malware to be installed? 

A. Security zones 

B. Phishing filter 

C. Protected mode 

D. Pop-up blocker 

Answer:


Q2. You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network. You plan to connect your company's LAN to the Internet. You are concerned about the security of your network and want to protect it against external access and misuse. Which device will you install between your LAN and the Internet to accomplish this? 

Answer: 


Q3. Which of the following can be installed and configured to prevent suspicious emails from entering the user's network?

A. Kerberos

B. Single sign-on (SSO)

C. TCP/IP protocol

D. Microsoft Forefront and Threat Management Gateway

Answer:


Q4. You work as a Network Administrator for TechMart Inc. The company has a Windows-based network. After completing a security audit of the company's Microsoft Windows Server 2008 R2 file servers, you have determined that folder and share security requires a revision on the basis of corporate reorganization. You have noticed that some shares on the file system are not secured. Which of the following is a feature that you will use to reassign permissions without assigning permissions to every parent and child folder? 

A. Inheritance 

B. Kerberos 

C. TCP/IP protocol 

D. User Account Control (UAC) 

Answer:


Q5. Which of the following is a collection or list of user accounts or computer accounts? 

A. Group 

B. Active Directory 

C. Domain 

D. Public folder 

Answer:


Q6. Which of the following security zones is used for Web sites that the user does not trust? 

A. Internet zone 

B. Trusted zone 

C. Restricted zone 

D. Local Intranet zone 

Answer:


Q7. You work as a Network Administrator for a medium sized business. Spam has become a significant problem for your company. You want to have a common network wide solution. You want a solution that is easy to administer. However, you do not want your solution to hinder the performance of your email server. What is the best solution for you to implement?

A. Utilize a client side anti-spam solution.

B. Use a combination of mail server engine and client side.

C. Utilize a gateway filter anti-spam solution.

D. Utilize a mail server engine anti-spam solution.

Answer: C


Q8. Which of the following is often used for one-to-many communications using broadcast or multicast IP datagrams? 

A. UDP 

B. FTP 

C. HTTP 

D. SMTP 

Answer:


Q9. Mark works as the Network Administrator of a Windows 2000 based network. In order to reduce the administrative burden and to optimize the network performance, he implements the DHCP and the DNS servers on the network. What will he do integrate the working between the DHCP and the DNS servers? Each correct answer represents a part of the solution. Choose two. 

A. Configure the clients to use the DHCP server. 

B. Enable DNS updates on the DHCP server. 

C. Enable dynamic update on the DNS server. 

D. Use the TCP/IP protocol on the network. 

Answer: BC 


Q10. Which of the following is the process of keeping track of a user's activity while accessing network resources? 

A. Authentication 

B. Auditing 

C. Spoofing 

D. Biometrics 

Answer: