Virtual 98-367 Exam Questions 2021
Want to know security fundamentals mta exam 98 367 features? Want to lear more about security fundamentals mta exam 98 367 experience? Study security fundamentals mta exam 98 367. Gat a success with an absolute guarantee to pass Microsoft 98-367 (MTA Security Fundamentals Practice Test) test on your first attempt.
Free demo questions for Microsoft 98-367 Exam Dumps Below:
NEW QUESTION 1
Which password attack uses all possible alpha numeric combinations?
- A. Social engineering
- B. Brute force attack
- C. Dictionary attack
- D. Rainbow table attack
Answer: C
NEW QUESTION 2
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Answer:
Explanation: 
NEW QUESTION 3
Many Internet sites that you visit require a user name and password. How should you secure these passwords?
- A. Save them to a text file
- B. Enable session caching
- C. Configure the browser to save passwords
- D. Save them to an encrypted file
- E. Reuse the same password
Answer: D
NEW QUESTION 4
A mail system administrator scans for viruses in incoming emails to increase the speed of mail processing.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
- A. Decrease the chances of a virus getting to a client machine
- B. Verify that the senders of the messages are legitimate
- C. Ensure that all links in the messages are trustworthy
- D. No change is needed.
Answer: A
NEW QUESTION 5
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Answer:
Explanation: 
NEW QUESTION 6
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Answer:
Explanation: 
NEW QUESTION 7
You have two servers that run Windows Server. All drives on both servers are formatted by using NTFS.
You move a file from one server to the other server. The file's permissions in the new location will:
- A. Enable full access to the everyone group
- B. Restrict access to the Administrators group
- C. Inherit the destination folder's permissions
- D. Retain the original folder's permissions
Answer: C
Explanation: You can modify how Windows Explorer handles permissions when objects are copied or moved to another NTFS volume. When you copy or move an object to another volume, the object inherits the permissions of its new folder.
NEW QUESTION 8
A network sniffer is software or hardware that:
- A. Records user activity and transmits it to the server
- B. Captures and analyzes network communication
- C. Protects workstations from intrusions
- D. Catalogs network data to create a secure index
Answer: B
Explanation: A network sniffer is a computer tool that captures network data in the form of low-level packets. Network sniffers can be used for technical troubleshooting and analyzing the communication.
NEW QUESTION 9
What are two attributes that an email message may contain that should cause a user to question whether the message is a phishing attempt? (Choose two.)
- A. An image contained in the message
- B. Spelling and grammar errors
- C. Threats of losing service
- D. Use of bold and italics
Answer: BC
Explanation: Reference: http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx
NEW QUESTION 10
You need to install a domain controller in a branch office. You also need to secure the information on the domain controller. You will be unable to physically secure the server.
Which should you implement?
- A. Read-Only Domain Controller
- B. Point-to-Point Tunneling Protocol (PPTP)
- C. Layer 2 Tunneling Protocol (L2TP)
- D. Server Core Domain Controller
Answer: A
Explanation: A read-only domain controller (RODC) is a new type of domain controller in the Windows Server® 2008 operating system. With an RODC, organizations can easily deploy a domain controller in locations where physical security cannot be guaranteed. An RODC hosts read- only partitions of the Active Directory® Domain Services (AD DS) database. http://technet.microsoft.com/en-us/library/cc732801(v=ws.10).aspx
NEW QUESTION 11
The purpose of a digital certificate is to verify that a:
- A. Public key belongs to a sender.
- B. Computer is virus-free.
- C. Private key belongs to a sender.
- D. Digital document is complete.
Answer: A
Explanation: In cryptography, a public key certificate (also known as a digital certificate or identity certificate) is an electronic document that uses a digital signature to bind a public key with an identity.
NEW QUESTION 12
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Answer:
Explanation: 
NEW QUESTION 13
The manager of a coffee shop hires you to securely set up WiFi in the shop.
To keep computer users from seeing each other, what should you use with an access point?
- A. Client bridge mode
- B. Client isolation mode
- C. MAC address filtering
- D. Client mode
Answer: B
Explanation: Wireless Client Isolation is a unique security feature for wireless networks. When Client Isolation is enabled any and all devices connected to the wireless LAN will be unable to talk to each other.
NEW QUESTION 14
HOTSPOT
You are preparing an audit policy for the workstations at Contoso, Ltd. Currently, no advanced auditing is enabled. The workstations are not members of the domain.
The settings of your Advanced Audit Policy Configuration are shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.

Answer:
Explanation: 
NEW QUESTION 15
Which two characteristics should you recommend for a user's domain password? (Choose two.)
- A. Hard to guess
- B. Includes Unicode characters
- C. Easy to remember
- D. Easy to increment
Answer: AC
Explanation: Reference: http://www.usewisdom.com/computer/passwords.html
NEW QUESTION 16
Which two are included in an enterprise antivirus program? (Choose two.)
- A. Attack surface scanning
- B. On-demand scanning
- C. Packet scanning
- D. Scheduled scanning
Answer: BD
100% Valid and Newest Version 98-367 Questions & Answers shared by prep-labs.com, Get Full Dumps HERE: https://www.prep-labs.com/dumps/98-367/ (New 123 Q&As)