Microsoft 98-367 ExamMTA Security Fundamentals Practice Test

Total Question: 123 Last Updated: Oct 11,2018
  • Updated 98-367 Dumps
  • Based on Real 98-367 Exams Scenarios
  • Free 98-367 pdf Demo Available
  • Check out our 98-367 Dumps in a new PDF format
  • Instant 98-367 download
  • Guarantee 98-367 success in first attempt
Package Select:

Questions & Answers PDF

Practice Test Software

Practice Test + PDF 30% Discount

Price: $65.95 $29.99

Buy Now Free Trial
Home > 98-367

Latest Microsoft 98-367 Pass4sure (Topic 2)

11. Which of the following are the major components of the IPsec protocol? Each correct answer represents a complete solution. Choose all that apply. 

A. Encapsulating Security Payload (ESP) 

B. Authentication Header (AH) 

C. Internet Encryption Key (IEK) 

D. Internet Key Exchange (IKE) 

Answer: ABD 

 

12. Which of following is required to be configured to ensure that the Bitlocker storage can be reclaimed? 

A. BitLocker to use data recovery agents 

B. BitLocker to use the password screen saver 

C. BitLocker to use the Secret Retrieval Agent 

D. BitLocker to use the Artificial Intelligence recovery option. 

Answer:

 

13. The stronger password is a critical element in the security plan. Which of the following are the characteristics used to make up a strong password? 

A. It contains more than seven hundred characters and does not contain the user name, real name, or any name that can be guessed by the attacker easily. 

B. It contains more than seven characters and does not contain the user name, real name, or anyname that can be guessed by the attacker easily. 

C. It contains the user name, real name, or any name that can be remembered easily and does not contain more than seven characters. 

D. It contains more than seven characters and the user name, real name, or any name. 

Answer:

 

14. Which of the following can be installed and configured to prevent suspicious emails from entering the user's network?

A. Kerberos

B. Single sign-on (SSO)

C. TCP/IP protocol

D. Microsoft Forefront and Threat Management Gateway

Answer:

 

15. Which of the following are types of password policies of Windows 7? Each correct answer represents a complete solution. Choose all that apply. 

A. Store Password Using Reversible Encryption 

B. Minimum Password Length 

C. User Name Length 

D. Password Must Meet Complexity Requirements 

Answer: ABD 

Get More Information : 98-367 exam