100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
MTA Security Test || QUESTIONS WITH ANSWERS 100% CORRECT!! $16.39
Add to cart

Exam (elaborations)

MTA Security Test || QUESTIONS WITH ANSWERS 100% CORRECT!!

 0 purchase
  • Course
  • MTA
  • Institution
  • MTA

D. Eavesdropping correct answers Which attack listens to network traffic of a computer resource? A. Resource gathering B. Denial of service C. ARP poisoning D. Eavesdropping E. Logic bomb C. 7 correct answers The default password length for a Windows server domain controller is: A. 14 B...

[Show more]

Preview 3 out of 23  pages

  • March 1, 2025
  • 23
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • MTA
  • MTA
avatar-seller
ProPerfomer
MTA Security Test || QUESTIONS WITH ANSWERS
100% CORRECT!!
D. Eavesdropping correct answers Which attack listens to network traffic of a computer
resource?
A. Resource gathering
B. Denial of service
C. ARP poisoning
D. Eavesdropping
E. Logic bomb

C. 7 correct answers The default password length for a Windows server domain controller is:

A. 14
B. 0
C. 7
D. 5

C. It translates public IP addresses to private addresses and vice versa. correct answers What
does NAT do?
A. It encrypts and authenticates IP packets.
B. It provides caching and reduces network traffic.
C. It translates public IP addresses to private addresses and vice versa.
D. It analyzes incoming and outgoing traffic packets.

A. Enforcing principle of least privilege correct answers Role separation improves server
security by:
A. Enforcing principle of least privilege.
B. Installing applications on separate hard disks.
C. Physically separating high security servers from other servers.
D. Placing servers on separate VLANs.

A. Disable the guest account
B. Rename the admin account correct answers The Graphic Design Institute hires you to help
them set up a server for their 20-person
team.
As a general practice of hardening the server, you start by performing which two tasks?
(Choose two.)
A. Disable the guest account.
B. Rename the admin account.
C. Remove the account lockout policy.
D. Format partitions with FAT32.

B. Captures and analyzes network communication correct answers A network sniffer is
software or hardware that:

A. Records user activity and transmits it to the server
B. Captures and analyzes network communication
C. Protects workstations from intrusions

,D. Catalogs network data to create a secure index

Eavesdropping
Alice should never send her password in plain text. correct answers Alice sends her password
to the game server in plain text.
Chuck is able to observe her password. What is Chuck doing?

A. Eavesdropping
B. Man in the middle
C. Denial of service

What should Alice never do?

A. Never send a plaintext password
B. Only send passwords in plaintext to well-known companies
C. Only send passwords in plaintext over the local network

A. Rainbow Table correct answers Your password is 1Vu*cI!8sT.

Which attack method is your password vulnerable to?

A. Rainbow table
B. Brute force
C. Spidering
D. Dictionary

A. Disable folder sharing correct answers A group of users has access to Folder A and all of
its contents.
You need to prevent some
of the users from accessing a subfolder inside Folder A.

What should you do first?

A. Disable folder sharing
B. Hide the folder
C. Change the owner
D. Block inheritance

D. Save them to an encrypted file correct answers Many Internet sites that you visit require a
user name and password.
How should you secure these passwords?
A. Save them to a text file
B. Enable session caching
C. Configure the browser to save passwords
D. Save them to an encrypted file
E. Reuse the same password

A. Routing correct answers Bridging is a process of sending packets from source to
destination on OSI layer 3. Select the correct answer if the underlined text does not make the

, statement correct. Select "No change is needed" if the underlined text makes the statement
correct.

A. Routing
B. Switching
C. Repeating
D. No change needed

A. Read-only Domain Controller correct answers You need to install a domain controller in a
branch office. You also need to secure the information on the domain controller. You will be
unable to physically secure the server. Which should you implement?

A. Read-Only Domain Controller
B. Point-to-Point Tunneling Protocol (PPTP)
C. Layer 2 Tunneling Protocol (L2TP)
D.Server Core Domain Controller

B. Spelling and grammar errors
C. Threats of losing service correct answers What are the two attributes that an email
message may contain that should cause a user to question whether the message is a phishing
attempt? (Choose two)

A. An image contained in the message
B. Spelling and grammar errors
C. Threats of losing service
D. Use of bold and italics

A. Service Set Identifier correct answers The WPA2 PreShared Key (PSK) is created by
using a password and salting it with the WPS PIN.

A. Service Set Identifier (SSID)
B. Admin password
C. WEP key
D. No change is needed

Radius server correct answers To implement WPA2 Enterprise, you would need a/an:
A. RADIUS server
B. SSL server
C. WEP server
D. VPN server

A. Disable unused services correct answers You are volunteering at an organization that gets
a brand new web server. To make the
server more secure, you should add a second administrator account.
Select the correct answer if the underlined text does not make the statement correct. Select
"No change is needed" if the underlined text makes the statement correct.

A. Disable unused services
B. Enable LM authentication
C. Enable NTLM authentication

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ProPerfomer. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $16.39. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67157 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 15 years now

Start selling
$16.39
  • (0)
Add to cart
Added