Microsoft 98-367 ExamMTA Security Fundamentals Practice Test

Total Question: 123 Last Updated: Mar 25,2019
  • Updated 98-367 Dumps
  • Based on Real 98-367 Exams Scenarios
  • Free 98-367 pdf Demo Available
  • Check out our 98-367 Dumps in a new PDF format
  • Instant 98-367 download
  • Guarantee 98-367 success in first attempt
Package Select:

Questions & Answers PDF

Practice Test Software

Practice Test + PDF 30% Discount

Price: $65.95 $29.99

Buy Now Free Trial

Where to find exam 98-367 security fundamentals pdf download

The Actualtests.internet is a credible web site to supply anyone with the nearly all accurate as well as original Microsoft Microsoft demos. Our own experts consistently update the Microsoft practice questions as well as answers according to the actual latest Microsoft 98-367 syllabus. There is certainly a little alter in the true Microsoft Microsoft exam every moment. Our staff members will certainly revise the Microsoft 98-367 exam dumps throughout good moment.

2016 Dec 98-367 security fundamentals pdf:

Q101. Which of the following can search contents of a hard disk, address book of an e-mail, or any information about the computer, and transmit the information to the advertisers or other interested parties without user knowledge? 

A. Malware 

B. Firmware 

C. Spyware 

D. Adware 


Q102. Which of the following applications captures network packets as they traverse a network and displays them to the attacker? 

A. Keylogger 

B. Sniffer 

C. Key fob 

D. Protocol analyzer 


Q103. You work as a Network Administrator for TechMart Inc. The company has a Windows-based network. After completing a security audit of the company's Microsoft Windows Server 2008 R2 file servers, you have determined that folder and share security requires a revision on the basis of corporate reorganization. You have noticed that some shares on the file system are not secured. Which of the following is the default permission setting that you have used when a share is created? 

A. Everyone with Change permission 

B. Administrators with the Full Control permission 

C. Administrators with the Change permission 

D. Everyone with Read permission 


Q104. Which of the following protocols transmits user credentials as plaintext?





Answer: C

Q105. Which of the following are the features of security level in the Restricted Sites zone 

A. The protection against harmful content is provided. 

B. The maximum safeguards are used. 

C. Most of the features are disabled. 

D. The default security level is low. 

Answer: ABC 

Most up-to-date 98-367 study guide pdf:

Q106. A user has opened a Web site that automatically starts downloading malicious code onto his computer. What should he do to prevent this? Each correct answer represents a complete solution. Choose two.

A. Disable ActiveX Controls

B. Disable Active Scripting

C. Implement File Integrity Auditing

D. Configure Security Logs

Answer: AB

Q107. Mark works as a Desktop Administrator for TechMart Inc. The company has a Windows-based network. He has bees assigned a project to upgrade the browsers to Internet Explorer (IE) 8 for working with the latest Internet technologies Mark wants to ensure that the company uses a number of the security features built into the browser while maintaining functionality within the company's intranet. Mark is also educating his users to be good Internet citizens and use the safe web sur?ng. Mark asked his team to be assured that they are on a secured website. What they will do? 

A. Take a look for a padlock in the lower right corner of the browser and https:// in the address bar. 

B. Provide protection against a Distributed Denial of Services attack. 

C. Call a team member while behaving to be someone else for gaining access to sensitive information. 

D. Go into the Internet Options, select the Security, and add the intranet site to the list of Local Intranet Site. 


Q108. Which of the following is a name that identifies a particular 802.11 wireless LAN?





Answer: D

Q109. Which of the following works at the network layer and hides the local area network IP address and topology?

A. Network address translation (NAT) 

B. MAC address 

C. Hub 

D. Network interface card (NIC) 


Q110. Mark works as a Network Administrator fot Blue Well Inc. The company has a Windows-based network. Mark is facing a series of problems with email spam and identifying theft via phishing scams. He wants to implement the various security measures and to provide some education because it is related to the best practices while using email. Which of the following can Mark use to minimize the spam amount that is hitting the Microsoft Exchange server of the company? 

A. Enable reverse DNS lookup 

B. Use Read-only Domain Controller 

C. Add Sender Policy Framework 

D. Permit User Account Control 


Related 98-367 Articles