aiotestking uk

Microsoft 98-367

Get real exam questions for 98-367 MTA Security Fundamentals Practice Test. 100% Free.

98-367 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

[2021-New] Microsoft 98-367 Dumps With Update Exam Questions (91-96)

Q1. Which of the following is method that can be used to identify Internet software in Software Restriction Policies? A. Restriction rule B. Identification rule C. Internet rule D. Zone rule View AnswerAnswer: D Q2. Which of the following infects the computer and then hides itself from detection by antivirus software?A. EICAR virusB. Boot-sector virusC. Macro virusD. Stealth virusView Ans


[2021-New] Microsoft 98-367 Dumps With Update Exam Questions (81-90)

Q1. Which of the following steps can be taken by an administrator as countermeasures against software keyloggers? Each correct answer represents a part of the solution. Choose all that apply. A. Use commercially available anti-keyloggers. B. Actively monitor the programs running on the server. C. Update antivirus regularly. D. Always check hard disk space on the server. View AnswerAnswer: A


[2021-New] Microsoft 98-367 Dumps With Update Exam Questions (71-80)

Q1. In which of the following is the file audit events are written when auditing is enabled? A. File system ACL B. Biometric device C. Network Access Control List D. Security event log View AnswerAnswer: D Q2. You work as a network administrator for an insurance company called InZed Inc. The company has developed a corporate policy that requires all machines to use the IPSec security prot


[2021-New] Microsoft 98-367 Dumps With Update Exam Questions (31-40)

Q1. You have configured a virtualized Internet browser on your Windows XP professional computer. Using the virtualized Internet browser, you can protect your operating system from which of the following? A. Brute force attack B. Distributed denial of service (DDOS) attack C. Mail bombing D. Malware installation from unknown Web sites View AnswerAnswer: D Q2. On which of the following is t


[2021-New] Microsoft 98-367 Dumps With Update Exam Questions (1-10)

Q1. Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network. The company is adding an open, high-speed, wireless access for their customers and secured wireless for employees at all 37 branches. He wants to check the various security concerns for ensuring that business traffic is secured. He is also under pressure to make this new feature a winning strategy


[2021-New] Microsoft 98-367 Dumps With Update Exam Questions (41-50)

Q1. Which of the following actions should be taken so that the computer requires confirmation before installing an ActiveX component?A. Configuring a firewall on the networkB. Configuring the settings on the Web BrowserC. Installing an anti-virus softwareD. Configuring DMZ on the networkView AnswerAnswer: B Q2. Which of the following protects against unauthorized access to confidential informa


[2021-New] Microsoft 98-367 Dumps With Update Exam Questions (31-40)

Q1. Which of the following is used to describe the policy of maximum password age?A. It is used to determine how old the user has to create a password.B. It is a time duration before a password is required to be public.C. It is a time duration before a password is required to be changed.D. It determines how old the password must be before the user is permitted to change it.View AnswerAnswer: CQ2


[2021-New] Microsoft 98-367 Dumps With Update Exam Questions (21-30)

Q1. Which of the following viruses cannot be detected by the signature-based antivirus? A. Polymorphic B. MBR virus C. Boot sector D. Macro View AnswerAnswer: A Q2. Which of the following ports is used by the Remote Desktop Protocol? A. 80 B. 23 C. 3389 D. 110 View AnswerAnswer: C Q3. Which of the following is a method of capturing and recording computer users' keystrokes incl


[2021-New] Microsoft 98-367 Dumps With Update Exam Questions (51-60)

Q1. Which of the following can be used to implement two-factor authentications? Each correct answer represents a complete solution. Choose all that apply. A. Firewall security rule B. Password C. Smart card D. Encrypted network configuration View AnswerAnswer: BC Q2. Which of the following is a program that runs at a specific date and time to cause unwanted and unauthorized functions? A.


[2021-New] Microsoft 98-367 Dumps With Update Exam Questions (61-70)

Q1. Which of the following protocols transmits user credentials as plaintext?A. CHAPB. MS-CHAP v2C. PAPD. MS-CHAPView AnswerAnswer: CQ2. All your domain controllers are configured for DHCP. Each time the system is booted, it gets a new IP address from the DHCP server. You had also configured the Active Directory on the domain controllers. You want to configure your DNS settings so that it will


[2021-New] Microsoft 98-367 Dumps With Update Exam Questions (71-80)

Q1. Which of the following layers defines the mechanisms that allow data to be passed from one network to another? A. Network layer B. Session layer C. Physical layer D. Data-link layer View AnswerAnswer: A Q2. You work as a Network Administrator for TechMart Inc. The company has a Windows-based network. After completing a security audit of the company's Microsoft Windows Server 2008


[2021-New] Microsoft 98-367 Dumps With Update Exam Questions (91-96)

Q1. What are the main classes of biometric characteristics? Each correct answer represents a complete solution. Choose two. A. PsychologicalB. Behavioral C. Fundamental D. Physiological View AnswerAnswer: BD Q2. Which of the following operating systems have Windows Security Health Agent (SHA) on computers and report their status to the Security Health Validator (SHV)? Each correct answer r


[2021-New] Microsoft 98-367 Dumps With Update Exam Questions (81-90)

Q1. Which of the following contains a tree of domain names? A. Domain name space B. Domain name formulation C. Domain Name System D. Authoritative name server View AnswerAnswer: A Q2. Which of the following are the types of OS fingerprinting techniques? Each correct answer represents a complete solution. Choose two. A. Passive fingerprinting B. Active fingerprinting C. Laser fingerprin


[2021-New] Microsoft 98-367 Dumps With Update Exam Questions (11-20)

Q1. Mark works as a Desktop Administrator for TechMart Inc. The company has a Windows-based network. He has bees assigned a project to upgrade the browsers to Internet Explorer (IE) 8 for working with the latest Internet technologies Mark wants to ensure that the company uses a number of the security features built into the browser while maintaining functionality within the company's intranet


[2021-New] Microsoft 98-367 Dumps With Update Exam Questions (1-10)

Q1. Which of the following are the main features of a key logger? Each correct answer represents a complete solution. Choose all that apply. A. It can be delivered via FTP or e-mail. B. It can record all keystrokes. C. It can capture all screenshots. D. It can detect viruses on the computer. View AnswerAnswer: ABC Q2. Which of the following services does IPSec provide for protecting data?