MTA Security Fundamentals Practice Test 98-367 Pdf

We provide real 98-367 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Microsoft 98-367 Exam quickly & easily. The 98-367 PDF type is available for reading and printing. You can print more and practice many times. With the help of our Microsoft 98-367 dumps pdf and vce product and material, you can easily pass the 98-367 exam.

Page: 1 / 13
Total 163 questions Full Exam Access
Question 1
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
98-367 dumps exhibit
Solution:
98-367 dumps exhibit

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 2
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
98-367 dumps exhibit
Solution:
98-367 dumps exhibit

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 3
What does NAT do?
My answer: -
Reference answer: C
Reference analysis:

Reference: http://en.wikipedia.org/wiki/Network_address_translation

Question 4
Your password is 1Vu*cI!8sT.
Which attack method is your password vulnerable to?
My answer: -
Reference answer: A
Reference analysis:

None

Question 5
Windows Firewall is a built-in. host-based, stateless firewall.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
My answer: -
Reference answer: A
Reference analysis:

None

Question 6
You need to limit the programs that can run on client computers to a specific list. Which technology should you implement?
My answer: -
Reference answer: A
Reference analysis:

None

Question 7
The default password length for a Windows Server domain controller is:
My answer: -
Reference answer: C
Reference analysis:

None

Question 8
E-mail bombing attacks a specific entity by:
My answer: -
Reference answer: B
Reference analysis:

In Internet usage, an email bomb is a form of net abuse consisting of sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted in a denial-of-service attack.

Question 9
Creating MD5 hash for files is an example of ensuring what?
My answer: -
Reference answer: D
Reference analysis:

The MD5 message-digest algorithm is a widely used cryptographic hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. MD5 has been utilized in a wide variety of cryptographic applications, and is also commonly used to verify data integrity.

Question 10
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
98-367 dumps exhibit
Solution:
98-367 dumps exhibit

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 11
How does the sender policy framework (SPF) aim to reduce spoofed email?
My answer: -
Reference answer: A
Reference analysis:

None

Question 12
You are an intern and are working remotely.
You need a solution that meets the following requirements:
✑ Allows you to access data on the company network securely
✑ Gives you the same privileges and access as if you were in the office
What are two connection methods you could use? (Choose two.)
My answer: -
Reference answer: BD
Reference analysis:

None

Question 13
In Internet Explorer 8, the InPrivate Browsing feature prevents:
My answer: -
Reference answer: D
Reference analysis:

Reference: http://windows.microsoft.com/en-us/windows/what-is-inprivate-browsing

Question 14
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select
No. Each correct selection is worth one point.
98-367 dumps exhibit
Solution:
98-367 dumps exhibit

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 15
You have a Windows 7 desktop computer, and you create a Standard User account for your roommate so that he can use the desktop from time to time. Your roommate has forgotten his password.
Which two actions can you take to reset the password? (Choose two.)
My answer: -
Reference answer: AB
Reference analysis:

None

Question 16
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
98-367 dumps exhibit
Solution:
98-367 dumps exhibit

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 17
You need to grant a set of users write access to a file on a network share. You should add the users to:
My answer: -
Reference answer: B
Reference analysis:

None

Question 18
You are volunteering at an organization that gets a brand new web server. To make the server more secure, you should add a second administrator account.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
My answer: -
Reference answer: A
Reference analysis:

None

Question 19
Bridging is a process of sending packets from source to destination on OSI layer 3.
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
My answer: -
Reference answer: A
Reference analysis:

None

Question 20
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
98-367 dumps exhibit
Solution:
98-367 dumps exhibit

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 21
HOTSPOT
You are preparing an audit policy for the workstations at Contoso, Ltd. Currently, no advanced auditing is enabled. The workstations are not members of the domain.
The settings of your Advanced Audit Policy Configuration are shown in the following image:
98-367 dumps exhibit
Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.
98-367 dumps exhibit
98-367 dumps exhibit
Solution:
98-367 dumps exhibit

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 22
Which three elements does HTTPS encrypt? (Choose three.)
My answer: -
Reference answer: ADE
Reference analysis:

Reference: http://stackoverflow.com/questions/499591/are-https-urls-encrypted

Page: 1 / 13
Total 163 questions Full Exam Access