Certification Exam Prep Questions For Microsoft Security Fundamentals (98-367)


QuickStart is now offering assessment questions for Microsoft Security Fundamentals (98-367) . Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice assessment to better aid in certification. 100% of the questions are real questions; from a recent version of the test you will take for Microsoft Security Fundamentals (98-367).


Arrow
 

1

Can you identify from the options below, the minimum shared folder permission which allows a user to delete a file?

A. Change
Correct!
B. Full Control
Correct!
C. Read and Execute
Incorrect.
D. List folder contents
Correct!
2

What benefit can we expect if we do not allow a wireless access point (WAP) broadcast its service set identifier (SSID)?

3

Can you identify the reason why it is extremely important to configure the physical security in laptops and other mobile devices?

4

Complete the sentence to make a correct statement. A wireless network that implements WEP:

5

You have a server on which you are required to apply all security updates. What would you use to make sure all updates have been applied?

6

Which is the best way to prevent security compromises through social engineering?

A. Increased password complexity
Incorrect.
B. User training
Correct!
C. Employee ID badges
Incorrect.
D. Internal e-mail servers
Incorrect.
7

Which is the best way to prevent security compromises through social engineering?

8

There is a specific situation when using a stand-alone certificate authority (CA) in your public key infrastructure (PKI) design would make the most sense. Can you identify which of the following is that situation?

9

A web browser has to be accessed by public but at the same time the visitors to web server must not have access to your internal network. Which of the following will you configure?

10

Identify a protocol which can be used to centralize the authentication for these connections: Dial-up, Virtual Private Network (VPN), and IEEE 802.11 Wi-Fi access connections

A. SSTP
Incorrect.
B. AAA
Incorrect.
C. EFS
Incorrect.
D. RADIUS
Correct!
11

What happens When User Access Control (UAC) is enabled?

12

Your company has a server that runs Windows Server 2008. You have clients’ computers running on the network. To enforce compliance on their computers, you plan to deploy NAP. Identify the client operating systems that are supported?

13

Can you identify from the following what can be called the primary purpose of a firewall?

14

There is a file that needs to be accessed by selective users. However, permission to access has been denied for all users. It is important to access the file immediately. What steps would you take if you are logged on as an administrator?

15

Can you identify from the following, a method of firewall inspection that logs outgoing connections while also checking the incoming traffic against the same log?

16

What is an Object access auditing used to monitor?

17

What will you choose to do if you are required to create a password policy that allows domain account passwords to reset in the time frame of two weeks?

18

There are 10 computers in a training room in your company. Different users will be using different software in those computers. You must have control over different computers as to what software can be run by specific users logging on to the computers. Which two options would you take? (opt any TWO)

19

What is the process called where network information and content of network packets are collected via monitoring network communications?

A. Flooding
Incorrect.
B. Spoofing
Incorrect.
C. Sniffing
Correct!
D. Hijacking
Incorrect.
20

You have permissions to log on as a standard user most often. However, sometimes you are required to run programs that need administrator permissions. What would you do in this situation keeping in mind the security risks must be kept to a minimum?

21

From the following options, which can be called a social engineering attack?

A. Nonrepudiation
Incorrect.
B. Phishing
Correct!
C. Eavesdropping attack
Incorrect.
D. Brute force attack
Incorrect.
22

Can you identify from the following options the benefits you can get from SPF records?

23

Complete the sentence with the option that makes the statement correct. Creating an antivirus quarantine area will result in:

24

Identify from the following options what can be called a feature of the SmartScreen filter.

25

Software firewalls:

26

Can you identify from the following, two features of a public key in asymmetric encryption? (opt any TWO)

Product Image

Sample Question - Microsoft Security Fundamentals (98-367)

Practice Exam

Learning Style

Beginner

Difficulty

Course Info

Download PDF

Certificate

See Sample

Buy Individually Timezone
tab
Courses Offered In This Certification

You have already taken demo for this course.

If you want to get access to demo again, feel free to contact our support at (855) 800-8240

Outline

More Information

More Information
Lab Access No
Learning Type Practice Exam
Difficulty Beginner
Language English

Reviews

Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

click here