100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Summary MTA security (Certification) $3.23   Add to cart

Summary

Summary MTA security (Certification)

3 reviews
 207 views  6 purchases
  • Course
  • Institution

This report is made for an MTA (Microsoft Technology Associate) certificate.

Preview 3 out of 24  pages

  • May 22, 2018
  • 24
  • 2016/2017
  • Summary

3  reviews

review-writer-avatar

By: christophercusack • 3 year ago

good

reply-writer-avatar

By: cmd2020 • 3 year ago

Translated by Google

Thank you for your review

review-writer-avatar

By: nabil1 • 5 year ago

review-writer-avatar

By: orie • 5 year ago

avatar-seller

Available practice questions

Flashcards 20 Flashcards
$3.77 1 sales

Some examples from this set of practice questions

1.

Quetions 1 Your Compant maintains a Web server that is accessible to the public. It should be placed in a/an: 1. Primary DNS zone. 2. Enterprise domain. 3. Perimeter network. 4. Virtual private network (VPN).

Answer: 3

2.

Question 2 A network sniffer is software or hardware that: 1.captures and analyzes network communication. 2.records user activity and transmits it to the server 3.protects workstations from intrustions. 4.catalogs network data to create a secure index.

Answer: 1

3.

Question 3 Which enables an employee to connect securely to a corporate network by using the Internet? 1.Virtual Private Networking (VPN) 2.Remote Desktop Protocol (RDP) 3.Network Address Translation (NAT) 4.Network Access Protection (NAP)

Answer: 1

4.

Question 4 You are trying to establish communications between a client computer and server. The server is not responding. You confirm that both the client and the server have network connectivity. Which should you check next? 1.Data Execution Prevention 2.Microsoft Update 3.Active Directory Domains and Trusts 4.Windows Firewall

Answer: 4

5.

Question 5 You have an application that communicates by using plain text. You want to secure communications between the application and a server at the network layer. What should you implement? 1.IPSec 2.SFTP 3.TLS 4.SSH

Answer: 1

6.

Question 6 Which technology enables you to filter communications between a program and the Internet? 1.Antivirus software 2.BitLocker To Go 3.RADIUS Server 4.Software firewall

Answer: 4

7.

Question 7 The primary purpose of Network Access Protection (NAP) is to prevent: 1.loss of data from client computers on a network. 2.non-compliant systems from connecting to a network. 3.unauthorized users from accessing a network. 4.users on a network from installing software.

Answer: 2

8.

Question 8 A malicious user who intercepts and modifies communications is known as a: 1.red hat hacker 2.man-in-the-middle 3.network sniffer. 4.white hat hacker.

Answer: 2

9.

Question 9 Which three file system objects can you specify the NTFS permissions for? (Choose three.) 1.Parents 2.Folders 3.Extensions 4.Files 5.Subfolders

Answer: 2, 4, 5

10.

Question 10 You need to prevent unauthorized users from reading a specific file on a portable computer if the portable computer is stolen. What should you implement? 1.Advanced Encryption Standard (AES) 2.Folder level permissions 3.File-level permissions 4.Distributed File System (DFS) 5.BitLocker

Answer: 5

,What are you trying to protect

Why does it needs to be Protected

What you’re protectng it rom



CIA

Confdentality

Integrity

Availability



Confidentiality



Confdentality is the the characteristc o a resource ensuring access is restricted to only permieed
users, applicatons or computer systems.



Confdentality deal iith ieeping in ormaton netioris and system secure rom unauthorieded access.



There are several technologies that support confdentality in a enterprise security implementaton

- Strong encrypton
- Strong Authentcaton
- Stringent access control




Integrity

Integrity is a defned as the consistency accuracy, and validity o data or in ormaton

One o the goals o a success ul in ormaton security program is to ensure that data is protected
against any unauthorieded or accidental changes.

, Availability



Availability describes a resource begin accessible to a user, applicaton or computer system ihen
required

In other iords availability means that ihen a user needs to get in ormaton he or she has the ability
to do so.



Typically threats to availability come in tio types accidental and deliberate



Risi management is the process o ident ying assessing and prioriteding threats and risis.



A risi is generally defned as the probability that an event iill occur.



A threat ihich is defned as an acton or occurrence that could result in the beach outage or
corrupton o a system by exploitng inoi or uninoin vulnerabilites.



The goal o any risi management plan is to remove risis ihen possible and to minimiede the
consequences o risis that cannot be eliminated.



Risi assessments are used to ident y the risis that might impact your partcular environment.



Dealing with risks

Afer you have prioriteded your risis you are ready to choose rom among the our generally accepted
responses to these risis they include :



- Avoidance
- Acceptance
- Mitgaton
- Trans er

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller cmd2020. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $3.23. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67096 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$3.23  6x  sold
  • (3)
  Add to cart