Certification Exam Prep Questions For Microsoft Security Fundamentals (98-367)


QuickStart is now offering assessment questions for Microsoft Security Fundamentals (98-367) . Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice assessment to better aid in certification. 100% of the questions are real questions; from a recent version of the test you will take for Microsoft Security Fundamentals (98-367).


Arrow
 

1

You need to ensure that all security updates have been applied to one of your servers. What should you use?

2

You want to ensure that mobile clients receive timely operating system updates. Some clients rarely connect to the internal business network. Which should you use?

3

What is the minimum shared folder permission that is required for a user to delete a file?

A. Read and Execute
Incorrect.
B. Change
Correct!
C. Full Control
Correct!
D. List folder contents
Correct!
4

What is the advantage of preventing a wireless access point (WAP) from broadcasting its service set identifier (SSID)?

5

For what reason is physical security extremely important with laptops and other mobile devices?

6

A wireless network that implements WEP:

7

Which is the best way to prevent security compromises through social engineering?

8

In e-mail, spoofing occurs when:

9

In which situation would you typically use a stand-alone certificate authority (CA) in your public key infrastructure (PKI) design?

10

You want to provide public access to a Web server. Visitors to the Web server should not have access to your internal network. You need to configure:

11

You administer your company's Windows Server 2012 R2 file server. The file server has two NTFS data volumes, D: and E:. You move a file from drive D: to drive E:. What happens to the file's original permissions?

12

You are a network administrator for your organization. The corporate help desk receive several customer complaints that visits to your organization's public website redirected them to a known malware site. You need to mitigate this type of network attack. Which technology should you implement?

A. NAP
Incorrect.
B. DNSSEC
Correct!
C. VPN
Incorrect.
D. IPSEC
Incorrect.
13

Which protocol can centralize authentication for dial-up, Virtual Private Network (VPN), and IEEE 802.11 Wi-Fi access connections?

A. EFS
Incorrect.
B. AAA
Incorrect.
C. RADIUS
Correct!
D. SSTP
Incorrect.
14

When you enable User Access Control (UAC):

15

You have a server running Windows Server 2008. You want to deploy NAP to enforce compliance for client computers on the network. Which client operating systems are supported?

16

What is the primary purpose of a firewall?

17

You are the security administrator for your company. All users have company-issued laptop computers running Windows 10 Enterprise Edition. The corporate network is organized as a single Active Directory Domain Services (AD DS) domain. You need to enforce a new security policy that requires that all locally cached corporate network data is protected against unauthorized access. What should you do?

18

All users have been denied all permissions to a file. You need to access the file as quickly as possible. You are logged on as an administrator. What should you do first?

19

Which firewall inspection method logs outgoing connections and checks incoming traffic against that log?

20

Object access auditing is used to monitor:

21

You need to create a password policy to ensure that domain account passwords must be reset every two weeks. What should you do?

22

You have a training room with 10 computers. You need to be able to control what software can be run by specific users logging on to the computers. What should you use? (Each correct answer presents a complete solution. Choose two.)

23

Monitoring network communications to collect information about the network and collect the content of network packets is known as:

A. Sniffing
Correct!
B. Spoofing
Incorrect.
C. Hijacking
Incorrect.
D. Flooding
Incorrect.
24

You normally log on as a standard user. You need to occasionally run programs that require administrator privileges. You want to keep the potential security risk to a minimum. What should you do?

25

What are two features of a public key in asymmetric encryption? (Each correct answer presents a complete solution. Choose two.)

26

Which would be an example of a social engineering attack?

A. Eavesdropping attack
Incorrect.
B. Phishing
Correct!
C. Brute force attack
Incorrect.
D. Nonrepudiation
Incorrect.
27

What benefit do SPF records provide??

28

Creating an antivirus quarantine area causes:

29

Which is a feature of the SmartScreen filter?

30

Software firewalls:

Product Image

Sample Question - Microsoft Security Fundamentals (98-367)

Practice Exam

Learning Style

Beginner

Difficulty

Course Info

Download PDF

Certificate

See Sample

Buy Individually
tab
Courses Offered In This Certification

You have already taken demo for this course.

If you want to get access to demo again, feel free to contact our support at (855) 800-8240

Outline

More Information

More Information
Lab AccessNo
Learning TypePractice Exam
DifficultyBeginner
LanguageEnglish

Reviews

Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

This Subscription Includes:

Information
Virtual instructor Led

Virtual Classroom Courses

Our virtual instructor-led courses give you access to live instructors training you with other live students in a virtual classroom environment.

200+ Virtual Classroom Courses
Information
Self-Paced

Online Self-Paced Courses

Take self-paced online courses at your convenience and own pace, with unlimited access to courses in various emerging technologies.

700+ Self-Paced Courses
Information
College

E-books blogs, case studies, ariticles

As part of informal learning, our platform will recommend E-books, whitepapers, case studies, articles, and videos. This is AI curated content closely aligned with your learning objectives.

E-books blogs, case studies,...
Information
College

College Accredited Courses

QuickStart courses are accredited by several top schools and universities, including Texas A&M and University of Phoenix. You can print out certificates and also apply them towards your degree plan with them.

College Accredited
Information
Dashboard

Full Learning Dashboard & Analytics

Access all your enrolled, completed, course statistics, and community discussions from one centralized and intuitive learning dashboard with built in analytics, course tracking, time spent, and more.

Analytics/Reporting
Information
Social

QuickStart Discussions

Engage with other learners where you can directly chat, ask questions, and socialize with other learners experts and instructors on a course subject.

Community Access Community Access
Information
Labs

Virtual Labs

Videos and lectures only go so far. Get real world, hands-on practice with virtual labs (not available for all courses).

Virtual Labs Virtual Labs
Information
Live Instructor Support

Live Instructor Mentoring & Support

Get your IT problems solved through a community of mentors, experts and peers. Get live help from experts to answer questions on course material or guidance on a project.

Mentoring & Discussions Mentoring & Discussions
Information
Dashboard

Career Paths

Start a learning pathway towards understanding and mastering your career. With QuickStart career paths, you can fully understanding and being the best in your field.

Learning Paths Learning Paths
Information
Dashboard

Informal Learning

Access to AI curated content from various content publishers which can help in self-directed learning.

Informal Learning Informal Learning
click here