Leads4pass > Microsoft > MTA > 98-367 > 98-367 Online Practice Questions and Answers

98-367 Online Practice Questions and Answers

Questions 4

Alice sends her password to the game server in plaintext. Chuck is able to observe her password as shown in the following image:

Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.

Hot Area:

Buy Now
Questions 5

You are using the Microsoft Edge browser to connect to a web server that hosts a test version of a web application. You receive the following message:

Instructions: Use the drop-down menus to select the answer choice that completes each statement based on the information.

Hot Area:

Buy Now
Questions 6

The client computers on your network are stable and do not need any new features. Which is a benefit of applying operating system updates to these clients?

A. Keep the software licensed

B. Keep the server ports available

C. Update the hardware firewall

D. Close existing vulnerabilities

Buy Now
Questions 7

To keep third-party content providers from tracking your movements on the web, enable InPrivate Browsing.

Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.

A. InPrivate Filtering

B. SmartScreen Filter

C. Compatibility Mode

D. No change is needed

Buy Now
Questions 8

The company that you work for wants to set up a secure network, but they do not have any servers. Which three security methods require the use of a server? (Choose three.)

A. 802.1x

B. WPA2 Personal

C. WPA2 Enterprise

D. RADIUS

E. 802.11ac

Buy Now
Questions 9

Mark works as a Network Administrator fot Blue Well Inc. The company has a Windows-based network. Mark is facing a series of problems with email spam and identifying theft via phishing scams. He wants to implement the various security measures and to provide some education because it is related to the best practices while using email. Which of the following will Mark ask to employees of his company to do when they receive an email from a company they know with a request to click the link to "verify their account information"?

A. Provide the required information

B. Hide the email

C. Use Read-only Domain Controller

D. Delete the email

Buy Now
Questions 10

Which of the following is a secret numeric password shared between a user and a system for authenticating the user to the system?

A. Key escrow

B. Public key

C. Private key

D. PIN

Buy Now
Questions 11

Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network uses Network Access Protection (NAP). The company's employees at the remote locations are connecting to the company's network from their Windows Vista clients. Mark wants to ensure that the data transmission between a client computer and the company's network is as secure as possible. What will Mark do to accomplish the task?

A. Use Encrypting File System (Efs) between the client computer and the company's network.

B. Use IPSec NAP policy between client computer and the company's network.

C. Use VPN connection with MS-CHAP v2 between the client computer and the company's network.

D. Use NAP enforcement for DHCP.

Buy Now
Questions 12

You have a new computer and want to restrict other people from replacing the operating system.

Which action prevents a user from installing an alternate operating system by using physical media if the user has physical media if the user has physical access to the computer?

A. installing drive-level encryption

B. disabling removable devices and drives

C. password protecting the computer BIOS

D. removing the user from the administrators group

Buy Now
Questions 13

This question requires that you evaluate the underlined text to determine if it is correct.

Malware is any kind of unwanted software that is installed without your consent.

Instructions: Review the underlined text. If it makes the statement correct, select "No change is needed". If the statement is incorrect, select the answer choice that makes the statement correct.

A. Trojans are

B. Worms are

C. Viruses are

D. No change is needed

Buy Now
Exam Code: 98-367
Exam Name: Security Fundamentals
Last Update: Oct 20, 2024
Questions: 277
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99