Certification Practice Test Sample Questions For Microsoft Security Fundamentals (98-367)
QuickStart is now offering sample questions for Microsoft Security Fundamentals (98-367) . Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice test to better aid in certification. 100% of the questions are real test questions; from a recent version of the Microsoft Security Fundamentals (98-367) exam.


Microsoft Security Workshop: Enterprise Security Fundamentals (MS-40551)
Enroll now today and get 30% off using discount code PRACTICE30 at checkout.

Microsoft Security, Compliance, and Identity Fundamentals (SC-900T00)
Enroll now today and get 30% off using discount code at checkout.
Microsoft Security Fundamentals (98-367) Sample Exam Questions
Can you identify from the options below, the minimum shared folder permission which allows a user to delete a file?
- A. Change
-
Correct!
- B. Full Control
-
Correct!
- C. Read and Execute
-
Incorrect.
- D. List folder contents
-
Correct!
What benefit can we expect if we do not allow a wireless access point (WAP) broadcast its service set identifier (SSID)?
- B. It blocks authorized clients from connecting to the WAP.
-
Incorrect.
- D. It temporarily disables the WAP
-
Incorrect.
Can you identify the reason why it is extremely important to configure the physical security in laptops and other mobile devices?
- A. They can be lost or stolen
-
Correct!
- B. They are shared by multiple users.
-
Incorrect.
- C. They do not provide authentication for users.
-
Incorrect.
- D. They do not support data encryption
-
Incorrect.
Complete the sentence to make a correct statement. A wireless network that implements WEP:
- A. provides maximum security.
-
Incorrect.
- D. is not vulnerable to interference.
-
Incorrect.
You have a server on which you are required to apply all security updates. What would you use to make sure all updates have been applied?
- A. Microsoft Baseline Security Analyzer
-
Correct!
- B. A RADIUS server
-
Incorrect.
- C. Windows Deployment Services
-
Incorrect.
- D. ScanState.exe
-
Incorrect.
Which is the best way to prevent security compromises through social engineering?
- A. Increased password complexity
-
Incorrect.
- B. User training
-
Correct!
- C. Employee ID badges
-
Incorrect.
- D. Internal e-mail servers
-
Incorrect.
Which is the best way to prevent security compromises through social engineering?
- A. The sender uses a fake From address
-
Incorrect.
- C. The e-mail contains unsolicited business offers.
-
Incorrect.
- D. The sender uses a fake From address
-
Incorrect.
There is a specific situation when using a stand-alone certificate authority (CA) in your public key infrastructure (PKI) design would make the most sense. Can you identify which of the following is that situation?
- B. When deploying multiple root CAs in a single domain
-
Incorrect.
- D. When creating a hierarchy with a third party root.
-
Incorrect.
A web browser has to be accessed by public but at the same time the visitors to web server must not have access to your internal network. Which of the following will you configure?
- A. An Active Directory domain.
-
Incorrect.
- B. A virtual private network (VPN).
-
Incorrect.
- C. A perimeter network.
-
Correct!
- D. A virtual private network (VPN).
-
Incorrect.
Identify a protocol which can be used to centralize the authentication for these connections: Dial-up, Virtual Private Network (VPN), and IEEE 802.11 Wi-Fi access connections
What happens When User Access Control (UAC) is enabled?
- A. standard users are prevented from logging on.
-
Incorrect.
- B. administrative users are prevented from logging on.
-
Incorrect.
- C. All standard and administrative users run standard applications with standard application permissions
-
Correct!
- D. Standard users are prevented from logging on.
-
Incorrect.
Your company has a server that runs Windows Server 2008. You have clients’ computers running on the network. To enforce compliance on their computers, you plan to deploy NAP. Identify the client operating systems that are supported?
- A. Windows XP SP2 or later, Windows Vista, and Windows 7
-
Incorrect.
- B. Only Windows Vista and Windows 7
-
Incorrect.
- D. Only Windows 7
-
Incorrect.
Can you identify from the following what can be called the primary purpose of a firewall?
- A. To prevent users from running specific programs
-
Incorrect.
- B. To monitor security policy compliance
-
Incorrect.
- D. To monitor security policy compliance
-
Incorrect.
There is a file that needs to be accessed by selective users. However, permission to access has been denied for all users. It is important to access the file immediately. What steps would you take if you are logged on as an administrator?
- A. Change the file permissions
-
Incorrect.
- B. Take ownership of the file.
-
Correct!
- D. Restore from the most recent backup.
-
Incorrect.
Can you identify from the following, a method of firewall inspection that logs outgoing connections while also checking the incoming traffic against the same log?
- A. Port filtering
-
Incorrect.
- B. Application layer filtering
-
Incorrect.
- C. Stateful inspection
-
Correct!
- D. Circuit-level inspection
-
Incorrect.
What is an Object access auditing used to monitor?
- A. Which users open specific files
-
Correct!
- B. The amount of memory usage
-
Incorrect.
- C. Which users log on to the network.
-
Incorrect.
- D. The amount of CPU usage
-
Incorrect.
What will you choose to do if you are required to create a password policy that allows domain account passwords to reset in the time frame of two weeks?
- A. Specify a minimum password age.
-
Incorrect.
- B. Define password complexity requirements
-
Incorrect.
- C. Specify a maximum password age.
-
Correct!
- D. Define password complexity requirements.
-
Incorrect.
There are 10 computers in a training room in your company. Different users will be using different software in those computers. You must have control over different computers as to what software can be run by specific users logging on to the computers. Which two options would you take? (opt any TWO)
- A. Network Access Protection
-
Incorrect.
- B. AppLocker
-
Correct!
- C. Software restriction policies
-
Correct!
- D. A firewall filter
-
Incorrect.
What is the process called where network information and content of network packets are collected via monitoring network communications?
You have permissions to log on as a standard user most often. However, sometimes you are required to run programs that need administrator permissions. What would you do in this situation keeping in mind the security risks must be kept to a minimum?
- A. Disable User Account Control (UAC).
-
Incorrect.
- B. Log off and log on as a local administrator.
-
Incorrect.
- C. Use Run As to launch the programs.
-
Correct!
- D. Log off and log on as a domain administrator.
-
Incorrect.
From the following options, which can be called a social engineering attack?
- A. Nonrepudiation
-
Incorrect.
- B. Phishing
-
Correct!
- C. Eavesdropping attack
-
Incorrect.
- D. Brute force attack
-
Incorrect.
Can you identify from the following options the benefits you can get from SPF records?
- B. They prevent unauthorized clients from logging on.
-
Incorrect.
- D. They provide protection from brute force attacks
-
Incorrect.
Complete the sentence with the option that makes the statement correct. Creating an antivirus quarantine area will result in:
- A. All cookies to be permanently deleted.
-
Incorrect.
- B. Freeware to not be installed.
-
Incorrect.
- C. Potential viruses to be isolated.
-
Correct!
- D. Spyware to be detected
-
Incorrect.
Identify from the following options what can be called a feature of the SmartScreen filter.
- B. It encrypts data communication with the Web server.
-
Incorrect.
- D. It encrypts data communication with the Web server.
-
Incorrect.
Software firewalls:
- B. Cannot support network address translation (NAT).
-
Incorrect.
- C. Must be deployed on the internal network.
-
Incorrect.
- D. Operate as host firewalls only.
-
Incorrect.
Can you identify from the following, two features of a public key in asymmetric encryption? (opt any TWO)
- A. It is used to decrypt data.
-
Incorrect.
- B. It is distributed by certificate.
-
Correct!
- C. It is used to encrypt data.
-
Correct!
- D. It is seen only by the key's owner.
-
Incorrect.
Tell Us About You:
- Home
- Sample Question - Microsoft Security Fundamentals (98-367)
Sample Question - Microsoft Security Fundamentals (98-367)
More Information:
- Learning Style: Practice Exam
- Difficulty: Beginner
- Course Info: Download PDF
- Certificate: See Sample
Contact a Learning Consultant
Need Training for 5 or More People?
Customized to your team's need:
- Annual Subscriptions
- Private Training
- Flexible Pricing
- Enterprise LMS
- Dedicated Customer Success Manager
Outline
Reviews
Community Experts

About Our Experts
Our experts featured on QuickStart are driven by our ExpertConnect platform, a community of professionals focused on IT topics and discussions. Interact with these experts, create project opportunities, gain help and insights on questions you may have, and more.