Vcehome > Microsoft > MTA: Security Fundamentals > 98-367 > 98-367 Online Practice Questions and Answers

98-367 Online Practice Questions and Answers

Questions 4

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

Hot Area:

Browse 277 Q&As
Questions 5

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

Hot Area:

Browse 277 Q&As
Questions 6

Cookies impact security by enabling: (Choose two.)

A. Storage of Web site passwords.

B. Higher security Web site protections.

C. Secure Sockets Layer (SSL).

D. Web sites to track browsing habits.

Browse 277 Q&As
Questions 7

You need to be able to gather information about a running program.

Which type of auditing should you implement?

A. directory services

B. object access

C. logon events

D. process tracking

Browse 277 Q&As
Questions 8

Mark works as a Network Administrator fot Blue Well Inc. The company has a Windows-based network. Mark is facing a series of problems with email spam and identifying theft via phishing scams. He wants to implement the various security measures and to provide some education because it is related to the best practices while using email. Which of the following will Mark ask to employees of his company to do when they receive an email from a company they know with a request to click the link to "verify their account information"?

A. Provide the required information

B. Hide the email

C. Use Read-only Domain Controller

D. Delete the email

Browse 277 Q&As
Questions 9

Which of the following viruses cannot be detected by signature-based antivirus?

A. Macro virus

B. Boot sector virus

C. MBR virus

D. Polymorphic virus

Browse 277 Q&As
Questions 10

Ron owns the domain TechPerfect.net. He often receives bounces about messages he didn't send. After looking at all such mails, he is sure that someone is spamming e- mails and using his domain name. What will Ron do to ensure that his domain name is not exploited?

A. Publish the MX record for the domain.

B. Publish the SPF record for the domain.

C. Publish the AAAA record for the domain.

D. Publish the A record for the domain.

Browse 277 Q&As
Questions 11

You work as a security manager for Company Inc. An individual is connecting to your corporate internal network over the Internet. You have to ensure that he is not an intruder masquerading as an authorized user. Which of the following technologies will you use to accomplish the task?

A. Two-factor authentication

B. IP address packet filtering

C. Intrusion detection system (IDS)

D. Embedded digital signature

Browse 277 Q&As
Questions 12

Mark works as a Security Administrator for TechMart Inc. The company has a a Windows-based network. Mark has gone through a security audit for ensuring that the technical system is secure and protected. While this audit, he identified many areas that need improvement. He wants to minimize the risk for potential security threats by educating team members in the area of social engineering, and providing basic security principle knowledge and he also wants to stress the Con?dentiality, Integrity, and Availability triangle in his training. For this purpose, he plans to implement the principle of least privilege. In which of the following way, it will affect his team members?

A. They are required to ask administrator every time when they want to access resources.

B. They are granted with a smallest set of privileges to the resources

C. They are required to log on as administrator to have access to their resources

D. The current resource access of team members will not change.

Browse 277 Q&As
Questions 13

This question requires that you evaluate the underlined text to determine if it is correct.

To determine which action, if any, to take on an inbound message, anti-spam and antivirus recipient filtering inspects the IP address of the remote server that is trying to send messages.

Instructions: Review the underlined text. If it makes the statement correct, select "No change is needed." If the statement is incorrect, select the answer choice that makes the statement correct.

A. connection

B. sender

C. content

D. No change is needed

Browse 277 Q&As
Exam Code: 98-367
Exam Name: Security Fundamentals
Last Update: Apr 29, 2024
Questions: 277 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99