Certification Exam Prep Questions For Microsoft Security Fundamentals (98-367)


QuickStart is now offering assessment questions for Microsoft Security Fundamentals (98-367) . Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice assessment to better aid in certification. 100% of the questions are real questions; from a recent version of the test you will take for Microsoft Security Fundamentals (98-367).


Arrow
 

1

You need to ensure that all security updates have been applied to one of your servers. What should you use?

2

You want to ensure that mobile clients receive timely operating system updates. Some clients rarely connect to the internal business network. Which should you use?

3

What is the minimum shared folder permission that is required for a user to delete a file?

A. Read and Execute
Incorrect.
B. Change
Correct!
C. Full Control
Correct!
D. List folder contents
Correct!
4

What is the advantage of preventing a wireless access point (WAP) from broadcasting its service set identifier (SSID)?

5

For what reason is physical security extremely important with laptops and other mobile devices?

6

A wireless network that implements WEP:

7

Which is the best way to prevent security compromises through social engineering?

A. Increased password complexity
Incorrect.
B. User training
Correct!
C. Employee ID badges
Incorrect.
D. Internal e-mail servers
Incorrect.
8

In e-mail, spoofing occurs when:

9

In which situation would you typically use a stand-alone certificate authority (CA) in your public key infrastructure (PKI) design?

10

You want to provide public access to a Web server. Visitors to the Web server should not have access to your internal network. You need to configure:

11

You administer your company's Windows Server 2012 R2 file server. The file server has two NTFS data volumes, D: and E:. You move a file from drive D: to drive E:. What happens to the file's original permissions?

12

You are a network administrator for your organization. The corporate help desk receive several customer complaints that visits to your organization's public website redirected them to a known malware site. You need to mitigate this type of network attack. Which technology should you implement?

A. NAP
Incorrect.
B. DNSSEC
Correct!
C. VPN
Incorrect.
D. IPSEC
Incorrect.
13

Which protocol can centralize authentication for dial-up, Virtual Private Network (VPN), and IEEE 802.11 Wi-Fi access connections?

A. EFS
Incorrect.
B. AAA
Incorrect.
C. RADIUS
Correct!
D. SSTP
Incorrect.
14

When you enable User Access Control (UAC):

15

You have a server running Windows Server 2008. You want to deploy NAP to enforce compliance for client computers on the network. Which client operating systems are supported?

16

What is the primary purpose of a firewall?

17

You are the security administrator for your company. All users have company-issued laptop computers running Windows 10 Enterprise Edition. The corporate network is organized as a single Active Directory Domain Services (AD DS) domain. You need to enforce a new security policy that requires that all locally cached corporate network data is protected against unauthorized access. What should you do?

18

All users have been denied all permissions to a file. You need to access the file as quickly as possible. You are logged on as an administrator. What should you do first?

19

Which firewall inspection method logs outgoing connections and checks incoming traffic against that log?

20

Object access auditing is used to monitor:

21

You need to create a password policy to ensure that domain account passwords must be reset every two weeks. What should you do?

22

You have a training room with 10 computers. You need to be able to control what software can be run by specific users logging on to the computers. What should you use? (Each correct answer presents a complete solution. Choose two.)

23

Monitoring network communications to collect information about the network and collect the content of network packets is known as:

A. Sniffing
Correct!
B. Spoofing
Incorrect.
C. Hijacking
Incorrect.
D. Flooding
Incorrect.
24

You normally log on as a standard user. You need to occasionally run programs that require administrator privileges. You want to keep the potential security risk to a minimum. What should you do?

25

What are two features of a public key in asymmetric encryption? (Each correct answer presents a complete solution. Choose two.)

26

Which would be an example of a social engineering attack?

A. Eavesdropping attack
Incorrect.
B. Phishing
Correct!
C. Brute force attack
Incorrect.
D. Nonrepudiation
Incorrect.
27

What benefit do SPF records provide??

28

Creating an antivirus quarantine area causes:

29

Which is a feature of the SmartScreen filter?

30

Software firewalls:

PDP Url

Sample Question - Microsoft Security Fundamentals (98-367)


Beginner

Difficulty

Course Info

Download PDF

Certificate

See Sample

Buy Individually
Courses Offered In This Certification

Outline

More Information

More Information
Lab Access No
Difficulty Beginner
Language English

Reviews

Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

Contact A Learning Consultant


click here