Certification Practice Test Sample Questions For Microsoft Security Fundamentals (98-367)

QuickStart is now offering sample questions for Microsoft Security Fundamentals (98-367) . Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice test to better aid in certification. 100% of the questions are real test questions; from a recent version of the Microsoft Security Fundamentals (98-367) exam.


Arrow

Microsoft Security Workshop: Enterprise Security Fundamentals (MS-40551)

Enroll now today and get 30% off using discount code PRACTICE30 at checkout.

Microsoft Security, Compliance, and Identity Fundamentals (SC-900T00)

Enroll now today and get 30% off using discount code at checkout.

 
proceed to the next question. Correct answers will be displayed when you complete exam.

Microsoft Security Fundamentals (98-367) Sample Exam Questions

1

Can you identify from the options below, the minimum shared folder permission which allows a user to delete a file?

A. Change
Correct!
B. Full Control
Correct!
C. Read and Execute
Incorrect.
D. List folder contents
Correct!
2

What benefit can we expect if we do not allow a wireless access point (WAP) broadcast its service set identifier (SSID)?

3

Can you identify the reason why it is extremely important to configure the physical security in laptops and other mobile devices?

4

Complete the sentence to make a correct statement. A wireless network that implements WEP:

5

You have a server on which you are required to apply all security updates. What would you use to make sure all updates have been applied?

6

Which is the best way to prevent security compromises through social engineering?

A. Increased password complexity
Incorrect.
B. User training
Correct!
C. Employee ID badges
Incorrect.
D. Internal e-mail servers
Incorrect.
7

Which is the best way to prevent security compromises through social engineering?

8

There is a specific situation when using a stand-alone certificate authority (CA) in your public key infrastructure (PKI) design would make the most sense. Can you identify which of the following is that situation?

9

A web browser has to be accessed by public but at the same time the visitors to web server must not have access to your internal network. Which of the following will you configure?

10

Identify a protocol which can be used to centralize the authentication for these connections: Dial-up, Virtual Private Network (VPN), and IEEE 802.11 Wi-Fi access connections

A. SSTP
Incorrect.
B. AAA
Incorrect.
C. EFS
Incorrect.
D. RADIUS
Correct!
11

What happens When User Access Control (UAC) is enabled?

12

Your company has a server that runs Windows Server 2008. You have clients’ computers running on the network. To enforce compliance on their computers, you plan to deploy NAP. Identify the client operating systems that are supported?

13

Can you identify from the following what can be called the primary purpose of a firewall?

14

There is a file that needs to be accessed by selective users. However, permission to access has been denied for all users. It is important to access the file immediately. What steps would you take if you are logged on as an administrator?

15

Can you identify from the following, a method of firewall inspection that logs outgoing connections while also checking the incoming traffic against the same log?

16

What is an Object access auditing used to monitor?

17

What will you choose to do if you are required to create a password policy that allows domain account passwords to reset in the time frame of two weeks?

18

There are 10 computers in a training room in your company. Different users will be using different software in those computers. You must have control over different computers as to what software can be run by specific users logging on to the computers. Which two options would you take? (opt any TWO)

19

What is the process called where network information and content of network packets are collected via monitoring network communications?

A. Flooding
Incorrect.
B. Spoofing
Incorrect.
C. Sniffing
Correct!
D. Hijacking
Incorrect.
20

You have permissions to log on as a standard user most often. However, sometimes you are required to run programs that need administrator permissions. What would you do in this situation keeping in mind the security risks must be kept to a minimum?

21

From the following options, which can be called a social engineering attack?

A. Nonrepudiation
Incorrect.
B. Phishing
Correct!
C. Eavesdropping attack
Incorrect.
D. Brute force attack
Incorrect.
22

Can you identify from the following options the benefits you can get from SPF records?

23

Complete the sentence with the option that makes the statement correct. Creating an antivirus quarantine area will result in:

24

Identify from the following options what can be called a feature of the SmartScreen filter.

25

Software firewalls:

26

Can you identify from the following, two features of a public key in asymmetric encryption? (opt any TWO)

Sample Question - Microsoft Security Fundamentals (98-367)

More Information:

Need Training for 5 or More People?

Customized to your team's need:

  • Annual Subscriptions
  • Private Training
  • Flexible Pricing
  • Enterprise LMS
  • Dedicated Customer Success Manager

Outline

Reviews

Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

Hit button to validate captcha