Summary
Summary MTA security (Certification)
- Course
- Institution
This report is made for an MTA (Microsoft Technology Associate) certificate.
[Show more]Preview 3 out of 24 pages
Some examples from this set of practice questions
1.
Quetions 1 Your Compant maintains a Web server that is accessible to the public. It should be placed in a/an: 1. Primary DNS zone. 2. Enterprise domain. 3. Perimeter network. 4. Virtual private network (VPN).
Answer: 3
2.
Question 2 A network sniffer is software or hardware that: 1.captures and analyzes network communication. 2.records user activity and transmits it to the server 3.protects workstations from intrustions. 4.catalogs network data to create a secure index.
Answer: 1
3.
Question 3 Which enables an employee to connect securely to a corporate network by using the Internet? 1.Virtual Private Networking (VPN) 2.Remote Desktop Protocol (RDP) 3.Network Address Translation (NAT) 4.Network Access Protection (NAP)
Answer: 1
4.
Question 4 You are trying to establish communications between a client computer and server. The server is not responding. You confirm that both the client and the server have network connectivity. Which should you check next? 1.Data Execution Prevention 2.Microsoft Update 3.Active Directory Domains and Trusts 4.Windows Firewall
Answer: 4
5.
Question 5 You have an application that communicates by using plain text. You want to secure communications between the application and a server at the network layer. What should you implement? 1.IPSec 2.SFTP 3.TLS 4.SSH
Answer: 1
6.
Question 6 Which technology enables you to filter communications between a program and the Internet? 1.Antivirus software 2.BitLocker To Go 3.RADIUS Server 4.Software firewall
Answer: 4
7.
Question 7 The primary purpose of Network Access Protection (NAP) is to prevent: 1.loss of data from client computers on a network. 2.non-compliant systems from connecting to a network. 3.unauthorized users from accessing a network. 4.users on a network from installing software.
Answer: 2
8.
Question 8 A malicious user who intercepts and modifies communications is known as a: 1.red hat hacker 2.man-in-the-middle 3.network sniffer. 4.white hat hacker.
Answer: 2
9.
Question 9 Which three file system objects can you specify the NTFS permissions for? (Choose three.) 1.Parents 2.Folders 3.Extensions 4.Files 5.Subfolders
Answer: 2, 4, 5
10.
Question 10 You need to prevent unauthorized users from reading a specific file on a portable computer if the portable computer is stolen. What should you implement? 1.Advanced Encryption Standard (AES) 2.Folder level permissions 3.File-level permissions 4.Distributed File System (DFS) 5.BitLocker
Answer: 5
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller cmd2020. Stuvia facilitates payment to the seller.
No, you only buy these notes for $3.23. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
67096 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now