Microsoft 98-367 ExamMTA Security Fundamentals Practice Test

Total Question: 123 Last Updated: Mar 25,2019
  • Updated 98-367 Dumps
  • Based on Real 98-367 Exams Scenarios
  • Free 98-367 pdf Demo Available
  • Check out our 98-367 Dumps in a new PDF format
  • Instant 98-367 download
  • Guarantee 98-367 success in first attempt
Package Select:

Questions & Answers PDF

Practice Test Software

Practice Test + PDF 30% Discount

Price: $65.95 $29.99

Buy Now Free Trial
Home > 98-367

Latest Microsoft 98-367 coupon code (Topic 14)

71. Which of the following is a secret numeric password shared between a user and a system for authenticating the user to the system? 


B. Private key 

C. Key escrow 

D. Public key 



72. Mark works as a Network Administrator for BlueWell Inc. The company has a Windows-based network. Mark has retained his services to perform a security assessment of the company's network that has various servers exposed to the Internet. So, it may be vulnerable to an attack. Mark is using a single perimeter ?rewall, but he does not know if that is enough. He wants to review the situation and make some reliable recommendations so that he can protect the data over company's network. Which of the following will Mark do to accomplish the task? 

A. Outsource the related services. 

B. Encrypt the data and than start transmission. 

C. Locate the Internet-exposed servers and devices in an internal network. 

D. Create a perimeter network to isolate the servers from the internal network. 



73. Which of the following is a security protocol that is used to protect data from being modified, corrupted, or accessed without authorization?

A. Honeypot

B. IP Security (IPsec)


D. Protocol spoofing

Answer: B


74. Which of the following protocols is used to secure workstation and computer authentication across the network? 


B. Network Directory Access Protocol 

C. Kerberos 

D. Lightweight Directory Access Protocol 



75. Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network. The company had a many outbreaks of viruses on the network that are propagated via email. Mark wants to educate his team about malicious software and email. Which of the following will he suggest his team members to do when a suspicious email that contains an embedded hyperlink is received from a customer? 

A. To delete the email and then contact Mark and the customer. 

B. To forward the email to other team members for warning them that the email is not legitimate. 

C. To click the hyperlink for checking the result. 

D. To resend the email to the customer from which it seems to be sent. 


Get More Information : 98-367 exam