Labour Day Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Microsoft 98-367 Security fundamentals Exam Practice Test

Demo: 24 questions
Total 163 questions

Security fundamentals Questions and Answers

Question 1

The purpose of a digital certificate is to verify that a:

Options:

A.

Public key belongs to a sender.

B.

Computer is virus-free.

C.

Private key belongs to a sender.

D.

Digital document is complete.

Question 2

A Virtual Private Network (VPN) is a/an:

Options:

A.

Intrusion Prevention System that filters unauthorized communications in the enterprise network.

B.

virtual communication method that stores data transmitted in a private environment.

C.

tunnel that prevents information that passes through it from being modified or stolen.

D.

perimeter network that contains secure virtual servers.

Question 3

Alice and Bob are exchanging messages with each other. Chuck modifies the messages sent between Alice and Bob as shown in the following image:

Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.

Options:

Question 4

The Active Directory controls, enforces, and assigns security policies and access rights for all users.

Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

Options:

A.

NTFS permissions

B.

User Account Control

C.

Registry

D.

No change is needed

Question 5

What are two attributes that an email message may contain that should cause a user to question whether the message is a phishing attempt? (Choose two.)

Options:

A.

An image contained in the message

B.

Spelling and grammar errors

C.

Threats of losing service

D.

Use of bold and italics

Question 6

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

Options:

Question 7

You have a Windows 7 desktop computer, and you create a Standard User account for your roommate so that he can use the desktop from time to time. Your roommate has forgotten his password.

Which two actions can you take to reset the password? (Choose two.)

Options:

A.

Use your password reset disk.

B.

Use your administrator account.

C.

Boot into Safe Mode with your roommate's account.

D.

From your roommate's account press CTRL+ALT+DELETE, and then click Change a password.

Question 8

Match the authentication protocol with its description.

Instructions: To answer, drag the appropriate authentication protocol from the column on the left to its description on the right. Each authentication protocol may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

Note: Each correct match is worth one point

Options:

Question 9

You have a new computer and want to restrict other people from replacing the operating system.

Which action prevents a user from installing an alternate operating system by using physical media if the user has physical access to the computer?

Options:

A.

installing drive-level encryption

B.

disabling removable devices and drives

C.

password protecting the computer BIOS

D.

removing the user from the administrators group

Question 10

You are preparing a local audit policy for your workstation. No auditing is enabled.

The settings of your policy are shown in the following image:

Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.

Options:

Question 11

Windows Firewall is a built-in. host-based, stateless firewall.

Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

Options:

A.

Stateful

B.

Network layer

C.

Packet filter

D.

No change is needed

Question 12

This question requires that you evaluate the underlined text to determine if it is correct.

To determine which action, if any, to take on an inbound message, anti-spam and antivirus recipient filtering inspects the IP address of the remote server that is trying to send messages.

Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed.” If the statement is incorrect, select the answer choice that makes the statement correct.

Options:

A.

connection

B.

sender

C.

content

D.

No change is needed

Question 13

Physically securing servers prevents:

Options:

A.

Theft

B.

Compromise of the certificate chain

C.

Man-in-the middle attacks

D.

Denial of Service attacks

Question 14

A user who receives a large number of emails selling prescription medicine is probably receiving pharming mail.

Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

Options:

A.

Malware

B.

Spoofed mail

C.

Spam

D.

No change is needed.

Question 15

You want to make your computer resistant to online hackers and malicious software.

What should you do?

Options:

A.

Configure a forward proxy.

B.

Install anti-virus software.

C.

Enable spam filtering.

D.

Turn on Windows Firewall.

Question 16

This question requires that you evaluate the underlined text to determine if it is correct.

The first line of defense against attacks from the Internet is a software firewall.

Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.

Options:

A.

hardware firewall

B.

virus software

C.

radius server

D.

No change is needed

Question 17

The reason for implementing Service Set IDentifier (SSID) masking is to:

Options:

A.

enforce a more secure password policy

B.

hide a wireless network name from unknown computers

C.

hide a network share from unauthorized users

D.

disable autologon

Question 18

A digitally signed e-mail message:

Options:

A.

Validates the recipient

B.

Validates the sender

C.

Is encrypted

D.

Is virus-free

Question 19

The certificate of a secure public Web server on the Internet should be:

Options:

A.

Issued by a public certificate authority (CA)

B.

Signed by using a 4096-bit key

C.

Signed by using a 1024-bit key

D.

Issued by an enterprise certificate authority (CA)

Question 20

Which two are included in an enterprise antivirus program? (Choose two.)

Options:

A.

Attack surface scanning

B.

On-demand scanning

C.

Packet scanning

D.

Scheduled scanning

Question 21

Alice sends her password to the game server in plaintext. Chuck is able to observe her password as shown in the following image:

Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.

Options:

Question 22

You suspect a user's computer is infected by a virus.

What should you do first?

Options:

A.

Restart the computer in safe mode

B.

Replace the computer's hard disk drive

C.

Disconnect the computer from the network

D.

Install antivirus software on the computer

Question 23

Windows Server Update Services (WSUS) is a tool that:

Options:

A.

Updates data stored in Windows servers

B.

Manages the services that run on a server

C.

Updates licensing for Windows servers

D.

Manages updates for Microsoft software

Question 24

Which two security settings can be controlled by using group policy? (Choose two.)

Options:

A.

Password complexity

B.

Access to the Run... command

C.

Automatic file locking

D.

Encrypted access from a smart phone

Demo: 24 questions
Total 163 questions