Certbus > Microsoft > MTA > 98-367 > 98-367 Online Practice Questions and Answers

98-367 Online Practice Questions and Answers

Questions 4

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

Hot Area:

Browse 277 Q&As
Questions 5

Match the components of a secure website with their role in securing communication.

Instructions: To answer, drag the appropriate component from the column on the left to its role on the right.

Each component may be used once, more than once or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

Select and Place:

Browse 277 Q&As
Questions 6

You want to make your computer resistant to online hackers and malicious software. What should you do?

A. Configure a forward proxy.

B. Install anti-virus software.

C. Enable spam filtering.

D. Turn on Windows Firewall.

Browse 277 Q&As
Questions 7

Your company requires that users type a series of characters to access the wireless network.

The series of characters must meet the following requirements: Contains more than 15 characters Contains at least one letter Contains at least one number Contains at least one symbol

Which security technology meets these requirements?

A. WEP

B. WPA2 PSK

C. WPA2 Enterprise

D. MAC filtering

Browse 277 Q&As
Questions 8

A digitally signed e-mail message:

A. Validates the recipient

B. Validates the sender

C. Is encrypted

D. Is virus-free

Browse 277 Q&As
Questions 9

The purpose of User Account Control (UAC) is to:

A. Encrypt the user's account

B. Limit the privileges of software

C. Secure your data from corruption

D. Facilitate Internet filtering

Browse 277 Q&As
Questions 10

The Graphic Design Institute hires you to help them set up a server for their 20-person team.

As a general practice of hardening the server, you start by performing which two tasks? (Choose two.)

A. Disable the guest account.

B. Rename the admin account.

C. Remove the account lockout policy.

D. Format partitions with FAT32.

Browse 277 Q&As
Questions 11

Which provides the highest level of security in a firewall?

A. Stateful inspection

B. Outbound packet filters

C. Stateless inspection

D. Inbound packet filters

Browse 277 Q&As
Questions 12

E-mail spoofing:

A. Forwards e-mail messages to all contacts

B. Copies e-mail messages sent from a specific user

C. Obscures the true e-mail sender

D. Modifies e-mail routing logs

Browse 277 Q&As
Questions 13

Which of the following contains a tree of domain names?

A. Domain name space

B. Domain name formulation

C. Domain Name System

D. Authoritative name server

Browse 277 Q&As
Questions 14

Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network. The company is adding an open, high-speed, wireless access for their customers and secured wireless for employees at all 37 branches. He wants to check the various security concerns for ensuring that business traffic is secured. He is also in under pressure to make this new feature a winning strategy for a company. Mark wants the employees to be free to troubleshoot their own wireless connections before contacting him. Which of the following is the basic troubleshooting step that he can ask them to do?

A. To power cycle the wireless access points and then reboot the systems.

B. To configure the network to use only Extensible Authentication Protocol (EAP).

C. To reboot the computers they are using and then use the MAC filtering.

D. To right-click the network icon in the system tray and then select Troubleshoot Problems.

Browse 277 Q&As
Questions 15

Which of the following infects the computer and then hides itself from detection by antivirus software?

A. EICAR virus

B. Boot-sector virus

C. Macro virus

D. Stealth virus

Browse 277 Q&As
Questions 16

Which of the following are types of password policies of Windows 7? Each correct answer represents a complete solution. Choose all that apply.

A. Store Password Using Reversible Encryption

B. Minimum Password Length

C. User Name Length

D. Password Must Meet Complexity Requirements

Browse 277 Q&As
Questions 17

What are two reasons to implement VLANs? (Choose two.)

A. Manage traffic flow between the Internet and the network

B. Create the most secure path between two hosts

C. Enable grouping of hosts regardless of physical location

D. Separate hosts on the same network

Browse 277 Q&As
Questions 18

This question requires that you evaluate the underlined text to determine if it is correct.

To determine which action, if any, to take on an inbound message, anti-spam and antivirus recipient filtering inspects the IP address of the remote server that is trying to send messages.

Instructions: Review the underlined text. If it makes the statement correct, select "No change is needed." If the statement is incorrect, select the answer choice that makes the statement correct.

A. connection

B. sender

C. content

D. No change is needed

Browse 277 Q&As
Exam Code: 98-367
Exam Name: Security Fundamentals
Last Update: Apr 22, 2024
Questions: 277 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99