Sage Lika
Quiz von , erstellt am more than 1 year ago

Quiz am Missed MTA Questions, erstellt von Sage Lika am 23/04/2018.

14
0
0
Sage Lika
Erstellt von Sage Lika vor mehr als 6 Jahre
Schließen

Missed MTA Questions

Frage 1 von 43

1

What does NAT do?

Wähle eine der folgenden:

  • It encrypts and authenticates IP packets

  • It provides caching and reduces network traffic.

  • It translates public IP addresses to private addresses and vice versa.

  • It analyzes incoming and outgoing traffic packets.

Erklärung

Frage 2 von 43

1

Which is the minimum requirement to create BitLocker-To-Go media on a client computer?

Wähle eine der folgenden:

  • • A. Windows XP Professional Service Pack 3

  • • B. Windows Vista Enterprise Edition

  • • C. Windows 7 Enterprise Edition

  • • D. Windows 2000 Professional Service Pack 4

Erklärung

Frage 3 von 43

1

The Active Directory controls, enforces, and assigns security policies and access rights for
all users.
Select the correct answer if the underlined text does not make the statement correct. Select
"No change is needed" if the underlined text makes the statement correct.

Wähle eine der folgenden:

  • • A. NTFS permissions

  • • B. User Account Control

  • • C. Registry

  • • D. No change is needed

Erklärung

Frage 4 von 43

1

To protect systems from buffer overflow errors, you can use:

Wähle eine der folgenden:

  • • A. Antivirus software

  • • B. Data Execution Prevention

  • • C. A proxy server

  • • D. An Intruder Prevention System

Erklärung

Frage 5 von 43

1

You want to make your computer resistant to online hackers and malicious software.
What should you do?

Wähle eine der folgenden:

  • • A. Configure a forward proxy.

  • • B. Install anti-virus software.

  • • C. Enable spam filtering.

  • • D. Turn on Windows Firewall.

Erklärung

Frage 6 von 43

1

The certificate of a secure public Web server on the Internet should be:

Wähle eine der folgenden:

  • • A. Issued by a public certificate authority (CA)

  • • B. Signed by using a 4096-bit key

  • • C. Signed by using a 1024-bit key

  • • D. Issued by an enterprise certificate authority (CA)

Erklärung

Frage 7 von 43

1

What is a common method for password collection?

Wähle eine der folgenden:

  • • A. Email attachments

  • • B. Back door intrusions

  • • C. SQL Injection

  • • D. Network sniffers

Erklärung

Frage 8 von 43

1

Keeping a server updated:

Wähle eine der folgenden:

  • • A. Maximizes network efficiency

  • • B. Fixes security holes

  • • C. Speeds up folder access

  • • D. Synchronizes the server

Erklärung

Frage 9 von 43

1

What is an example of non-propagating malicious code?

Wähle eine der folgenden:

  • • A. A back door

  • • B. A hoax

  • • C. A Trojan horse

  • • D. A worm

Erklärung

Frage 10 von 43

1

Windows Server Update Services (WSUS) is a tool that:

Wähle eine der folgenden:

  • • A. Updates data stored in Windows servers

  • • B. Manages the services that run on a server

  • • C. Updates licensing for Windows servers

  • • D. Manages updates for Microsoft software

Erklärung

Frage 11 von 43

1

In Internet Explorer 8, the InPrivate Browsing feature prevents:

Wähle eine der folgenden:

  • • A. Unauthorized private data input.

  • • B. Unencrypted communication between the client computer and the server.

  • • C. User credentials from being sent over the Internet.

  • • D. Any session data from being stored on the computer.

Erklärung

Frage 12 von 43

1

Which enables you to change the permissions on a folder?

Wähle eine der folgenden:

  • • A. Take ownership

  • • B. Extended attributes

  • • C. Auditing

  • • D. Modify

Erklärung

Frage 13 von 43

1

You suspect a user's computer is infected by a virus.
What should you do first?

Wähle eine der folgenden:

  • • A. Restart the computer in safe mode

  • • B. Replace the computer's hard disk drive

  • • C. Disconnect the computer from the network

  • • D. Install antivirus software on the computer

Erklärung

Frage 14 von 43

1

You need to prevent unauthorized users from reading a specific file on a portable computer
if the portable computer is stolen.
What should you implement?

Wähle eine der folgenden:

  • • A. File-level permissions

  • • B. Advanced Encryption Standard (AES)

  • • C. Folder-level permissions

  • • D. Distributed File System (DFS)

  • • E. BitLocker

Erklärung

Frage 15 von 43

1

Which is a special folder permission?

Wähle eine der folgenden:

  • • A. Read

  • • B. Modify

  • • C. Write

  • • D. Delete

Erklärung

Frage 16 von 43

1

Network Access Protection (NAP) enables administrators to control access to network
resources based on a computer's:

Wähle eine der folgenden:

  • • A. Encryption level

  • • B. Warranty

  • • C. Physical location

  • • D. Configuration

Erklärung

Frage 17 von 43

1

A mail system administrator scans for viruses in incoming emails to increase the speed of
mail processing.
Select the correct answer if the underlined text does not make the statement correct. Select
"No change is needed" if the underlined text makes the statement correct.

Wähle eine der folgenden:

  • • A. Decrease the chances of a virus getting to a client machine

  • • B. Verify that the senders of the messages are legitimate

  • • C. Ensure that all links in the messages are trustworthy

  • • D. No change is needed.

Erklärung

Frage 18 von 43

1

When conducting a security audit the first step is to:

Wähle eine der folgenden:

  • • A. Inventory the company's technology assets

  • • B. Install auditing software on your servers

  • • C. Set up the system logs to audit security events

  • • D. Set up a virus quarantine area

Erklärung

Frage 19 von 43

1

You create a new file in a folder that has inheritance enabled.
By default, the new file:

Wähle eine der folgenden:

  • • A. Takes the permissions of the parent folder

  • • B. Does not take any permissions

  • • C. Takes the permissions of other folders in the same directory

  • • D. Takes the permissions of other files in the same directory

Erklärung

Frage 20 von 43

1

Windows Firewall is a built-in. host-based, stateless firewall.
Select the correct answer if the underlined text does not make the statement correct. Select
"No change is needed" if the underlined text makes the statement correct.

Wähle eine der folgenden:

  • • A. Stateful

  • • B. Network layer

  • • C. Packet filter

  • • D. No change is needed

Erklärung

Frage 21 von 43

1

What is the primary advantage of using Active Directory Integrated Zones?

Wähle eine der folgenden:

  • • A. Zone encryption

  • • B. Password protection

  • • C. Non-repudiation

  • • D. Secure replication

Erklärung

Frage 22 von 43

1

You need to limit the programs that can run on client computers to a specific list.
Which technology should you implement?

Wähle eine der folgenden:

  • • A. Windows Security Center

  • • B. Security Accounts Manager

  • • C. System Configuration Utility

  • • D. AppLocker group policies

Erklärung

Frage 23 von 43

1

The primary purpose of Network Access Protection (NAP) is to prevent:

Wähle eine der folgenden:

  • • A. Loss of data from client computers on a network.

  • • B. Non-compliant systems from connecting to a network.

  • • C. Users on a network from installing software.

  • • D. Unauthorized users from accessing a network.

Erklärung

Frage 24 von 43

1

You are trying to establish communications between a client computer and a server. The
server is not responding.
You confirm that both the client and the server have network connectivity.
Which should you check next?

Wähle eine der folgenden:

  • • A. Microsoft Update

  • • B. Data Execution Prevention

  • • C. Windows Firewall

  • • D. Active Directory Domains and Trusts

Erklärung

Frage 25 von 43

1

You would implement a wireless intrusion prevention system to:

Wähle eine der folgenden:

  • • A. Prevent wireless interference

  • • B. Detect wireless packet theft

  • • C. Prevent rogue wireless access points

  • • D. Enforce SSID broadcasting

Erklärung

Frage 26 von 43

1

You are trying to connect to an FTP server on the Internet from a computer in a school lab.
You cannot get a connection. You try on another computer with the same results. The
computers in the lab are able to browse the Internet.
You are able to connect to this FTP server from home.
What could be blocking the connection to the server?

Wähle eine der folgenden:

  • • A. A layer-2 switch

  • • B. A wireless access point

  • • C. A firewall

  • • D. A layer-2 hub

Erklärung

Frage 27 von 43

1

Which enables access to all of the logged-in user's capabilities on a computer?

Wähle eine der folgenden:

  • • A. Java applets

  • • B. ActiveX controls

  • • C. Active Server Pages (ASP)

  • • D. Microsoft Silverlight

Erklärung

Frage 28 von 43

1

Which two security settings can be controlled by using group policy? (Choose two.)

Wähle eine oder mehr der folgenden:

  • • A. Password complexity

  • • B. Access to the Run... command

  • • C. Automatic file locking

  • • D. Encrypted access from a smart phone

Erklärung

Frage 29 von 43

1

Which two are included in an enterprise antivirus program? (Choose two.)

Wähle eine oder mehr der folgenden:

  • • A. Attack surface scanning

  • • B. On-demand scanning

  • • C. Packet scanning

  • • D. Scheduled scanning

Erklärung

Frage 30 von 43

1

Which three elements does HTTPS encrypt? (Choose three.)

Wähle eine oder mehr der folgenden:

  • • A. Browser cookies

  • • B. Server IP address

  • • C. Port numbers

  • • D. Website URL

  • • E. Login information

Erklärung

Frage 31 von 43

1

What are three examples of two-factor authentication? (Choose three.)

Wähle eine oder mehr der folgenden:

  • • A. A fingerprint and a pattern

  • • B. A password and a smart card

  • • C. A username and a password

  • • D. A password and a pin number

  • • E. A pin number and a debit card

Erklärung

Frage 32 von 43

1

Select which of the following is true.

Wähle eine oder mehr der folgenden:

  • Because senior executives have rights to access sensitive data, they should use administrator accounts.

  • The UAC has one overall goal: to grant users the lowest level permissions required to complete their tasks

  • System administrators should use a standard user account when performing routine functions like reading emails and browsing the Internet.

Erklärung

Frage 33 von 43

1

Select which of the following is true.

Wähle eine oder mehr der folgenden:

  • IPsec requires network applications to be IPsec aware

  • IPsec encrypts data.

  • IPsec adds overhead for all network communications for which it is used.

Erklärung

Frage 34 von 43

1

Select which of the following is true.

Wähle eine oder mehr der folgenden:

  • UAC reduces your permissions to that of a standard user unless higher permissions are necessary

  • UAC notifies you when additional permissions are required and asks if you wish to continue.

  • UAC cannot be disabled.

Erklärung

Frage 35 von 43

1

Select which of the following is true.

Wähle eine oder mehr der folgenden:

  • BitLocker to Go Reader allows you to encrypt drives

  • BitLocker to Go Reader required drives that are encrypted using a password

  • BitLocker to Go works on Windows Vista and Windows XP

Erklärung

Frage 36 von 43

1

Select which of the following is true.

Wähle eine oder mehr der folgenden:

  • By using NAP, administrators can place non-compliant computers onto restricted networks

  • All computers that are not in compliance with NAP policies require manual intervention to be brought into compliance

  • NAP can enforce that client computers are running firewall

Erklärung

Frage 37 von 43

1

Select which of the following is true.

Wähle eine oder mehr der folgenden:

  • FAT32 has built-in security features that control user access

  • NTFS has built-in security features that control file access

  • All users on the same FAT32 file system have access rights to all files

Erklärung

Frage 38 von 43

1

_____ provides secure access to a network over the internet.

Wähle eine der folgenden:

  • NAP

  • VPN

  • NIP

  • NAT

Erklärung

Frage 39 von 43

1

_______ is an NTFS special permission.

Wähle eine der folgenden:

  • Full Control

  • Take Ownership

  • Clear

  • Write

Erklärung

Frage 40 von 43

1

What is the minimum character length requirement for the password of a domain controller?

Wähle eine der folgenden:

  • 0

  • 14

  • 1

  • 7

Erklärung

Frage 41 von 43

1

What infrastructure is used to assign and validate digital certificates?

Wähle eine der folgenden:

  • VPN

  • Active directory

  • PKI

  • Asymmetric algorithm

Erklärung

Frage 42 von 43

1

You are setting up your first workstation securely with Windows 7 professional and setting the password history. What are the minimum and maximum settings that you can use?

Wähle eine der folgenden:

  • 0, 14

  • 0, 255

  • 1, 14

  • 0, 24

Erklärung

Frage 43 von 43

1

One of the ways you can protect your computer from hackers and malicious software is to use _________.

Wähle eine der folgenden:

  • Windows Firewall

  • email filtering

  • Windows Security Essentials

  • spam filtering

Erklärung