100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

MTA Security Test || QUESTIONS WITH ANSWERS 100% CORRECT!!

Rating
-
Sold
-
Pages
23
Grade
A+
Uploaded on
01-03-2025
Written in
2024/2025

D. Eavesdropping correct answers Which attack listens to network traffic of a computer resource? A. Resource gathering B. Denial of service C. ARP poisoning D. Eavesdropping E. Logic bomb C. 7 correct answers The default password length for a Windows server domain controller is: A. 14 B. 0 C. 7 D. 5 C. It translates public IP addresses to private addresses and vice versa. correct answers What does NAT do? A. It encrypts and authenticates IP packets. B. It provides caching and reduces network traffic. C. It translates public IP addresses to private addresses and vice versa. D. It analyzes incoming and outgoing traffic packets. A. Enforcing principle of least privilege correct answers Role separation improves server security by: A. Enforcing principle of least privilege. B. Installing applications on separate hard disks. C. Physically separating high security servers from other servers. D. Placing servers on separate VLANs. A. Disable the guest account B. Rename the admin account correct answers The Graphic Design Institute hires you to help them set up a server for their 20-person team. As a general practice of hardening the server, you start by performing which two tasks? (Choose two.) A. Disable the guest account. B. Rename the admin account. C. Remove the account lockout policy. D. Format partitions with FAT32. B. Captures and analyzes network communication correct answers A network sniffer is software or hardware that: A. Records user activity and transmits it to the server B. Captures and analyzes network communication C. Protects workstations from intrusions

Show more Read less
Institution
MTA
Course
MTA










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
MTA
Course
MTA

Document information

Uploaded on
March 1, 2025
Number of pages
23
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

MTA Security Test || QUESTIONS WITH ANSWERS
100% CORRECT!!
D. Eavesdropping correct answers Which attack listens to network traffic of a computer
resource?
A. Resource gathering
B. Denial of service
C. ARP poisoning
D. Eavesdropping
E. Logic bomb

C. 7 correct answers The default password length for a Windows server domain controller is:

A. 14
B. 0
C. 7
D. 5

C. It translates public IP addresses to private addresses and vice versa. correct answers What
does NAT do?
A. It encrypts and authenticates IP packets.
B. It provides caching and reduces network traffic.
C. It translates public IP addresses to private addresses and vice versa.
D. It analyzes incoming and outgoing traffic packets.

A. Enforcing principle of least privilege correct answers Role separation improves server
security by:
A. Enforcing principle of least privilege.
B. Installing applications on separate hard disks.
C. Physically separating high security servers from other servers.
D. Placing servers on separate VLANs.

A. Disable the guest account
B. Rename the admin account correct answers The Graphic Design Institute hires you to help
them set up a server for their 20-person
team.
As a general practice of hardening the server, you start by performing which two tasks?
(Choose two.)
A. Disable the guest account.
B. Rename the admin account.
C. Remove the account lockout policy.
D. Format partitions with FAT32.

B. Captures and analyzes network communication correct answers A network sniffer is
software or hardware that:

A. Records user activity and transmits it to the server
B. Captures and analyzes network communication
C. Protects workstations from intrusions

,D. Catalogs network data to create a secure index

Eavesdropping
Alice should never send her password in plain text. correct answers Alice sends her password
to the game server in plain text.
Chuck is able to observe her password. What is Chuck doing?

A. Eavesdropping
B. Man in the middle
C. Denial of service

What should Alice never do?

A. Never send a plaintext password
B. Only send passwords in plaintext to well-known companies
C. Only send passwords in plaintext over the local network

A. Rainbow Table correct answers Your password is 1Vu*cI!8sT.

Which attack method is your password vulnerable to?

A. Rainbow table
B. Brute force
C. Spidering
D. Dictionary

A. Disable folder sharing correct answers A group of users has access to Folder A and all of
its contents.
You need to prevent some
of the users from accessing a subfolder inside Folder A.

What should you do first?

A. Disable folder sharing
B. Hide the folder
C. Change the owner
D. Block inheritance

D. Save them to an encrypted file correct answers Many Internet sites that you visit require a
user name and password.
How should you secure these passwords?
A. Save them to a text file
B. Enable session caching
C. Configure the browser to save passwords
D. Save them to an encrypted file
E. Reuse the same password

A. Routing correct answers Bridging is a process of sending packets from source to
destination on OSI layer 3. Select the correct answer if the underlined text does not make the

, statement correct. Select "No change is needed" if the underlined text makes the statement
correct.

A. Routing
B. Switching
C. Repeating
D. No change needed

A. Read-only Domain Controller correct answers You need to install a domain controller in a
branch office. You also need to secure the information on the domain controller. You will be
unable to physically secure the server. Which should you implement?

A. Read-Only Domain Controller
B. Point-to-Point Tunneling Protocol (PPTP)
C. Layer 2 Tunneling Protocol (L2TP)
D.Server Core Domain Controller

B. Spelling and grammar errors
C. Threats of losing service correct answers What are the two attributes that an email
message may contain that should cause a user to question whether the message is a phishing
attempt? (Choose two)

A. An image contained in the message
B. Spelling and grammar errors
C. Threats of losing service
D. Use of bold and italics

A. Service Set Identifier correct answers The WPA2 PreShared Key (PSK) is created by
using a password and salting it with the WPS PIN.

A. Service Set Identifier (SSID)
B. Admin password
C. WEP key
D. No change is needed

Radius server correct answers To implement WPA2 Enterprise, you would need a/an:
A. RADIUS server
B. SSL server
C. WEP server
D. VPN server

A. Disable unused services correct answers You are volunteering at an organization that gets
a brand new web server. To make the
server more secure, you should add a second administrator account.
Select the correct answer if the underlined text does not make the statement correct. Select
"No change is needed" if the underlined text makes the statement correct.

A. Disable unused services
B. Enable LM authentication
C. Enable NTLM authentication

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ProPerfomer (self)
View profile
Follow You need to be logged in order to follow users or courses
Sold
431
Member since
2 year
Number of followers
322
Documents
8502
Last sold
2 weeks ago
Global Scholars’ Resource Hub

Welcome to your ultimate exam success hub! We provide top-quality, up-to-date, and approved exam materials—study guides, practice tests, and notes for a variety of subjects. Whether you’re preparing for school, college, or professional exams, our resources are designed to help you study smarter and score higher. Thousands have passed with our materials—now it’s your turn!Need more resources or something specific? Contact me anytime, and I’ll be happy to help you find exactly what you need. Your success is our mission!" ✅ Covers multiple subjects and exam types ✅ Includes real practice questions, answers, and study tips ✅ Ideal for students, test takers, and last-minute review Your Exam Success Starts Here – Grab Your Bundle Before It’s Gone!

Read more Read less
3.9

83 reviews

5
36
4
25
3
9
2
1
1
12

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions