getcertified4sure.com

Facts about security fundamentals 98-367 pdf




Download of 98-367 exam price materials and braindump for Microsoft certification for IT specialist, Real Success Guaranteed with Updated 98-367 pdf dumps vce Materials. 100% PASS MTA Security Fundamentals Practice Test exam Today!

2021 Oct security fundamentals 98-367:

Q81. Which of the following practices should be followed to keep passwords secure? Each correct answer represents a complete solution. Choose three. 

A. Change the passwords whenever there is suspicion that they may have been compromised. 

B. A password should be alpha-numeric. 

C. A password should not be more than five words. 

D. Never write down a password. 

Answer: ABD 


Q82. Which of the following actions should be taken so that the computer requires confirmation before installing an ActiveX component?

A. Configuring a firewall on the network

B. Configuring the settings on the Web Browser

C. Installing an anti-virus software

D. Configuring DMZ on the network

Answer:


Q83. Which of the following tools traces all or specific activities of a user on a computer?

A. Task Manager

B. Event Viewer

C. Network Monitor

D. Keylogger

Answer: D


Q84. Which of the following services does IPSec provide for protecting data? Each correct answer represents a complete solution. Choose two. 

A. Network authentication 

B. Encryption 

C. Data authentication 

D. Compression 

Answer: BC 


Q85. Which of the following states that a user should never be given more privileges than are required to

carry out a task?

A. Security through obscurity

B. Segregation of duties

C. Principle of least privilege

D. Role-based security

Answer:


Latest 98-367 mta security fundamentals pdf download:

Q86. Which of the following can search contents of a hard disk, address book of an e-mail, or any information about the computer, and transmit the information to the advertisers or other interested parties without user knowledge? 

A. Malware 

B. Firmware 

C. Spyware 

D. Adware 

Answer:


Q87. Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to implement a method to ensure that the mobile devices are in a good state of security health when they are trying to access the corporate network. Which of the following is a control or strategy that Mark will implement to assure the security health?

A. TCP/IP protocol

B. Kerberos

C. Single Sign On

D. Network Access Protection

Answer: D


Q88. Which of the following is a use of Microsoft Windows Malicious Software Removal Tool? 

A. To gain unauthorized remote access to a computer and launch additional attacks. 

B. To distribute itself automatically from one computer to another via network connections. 

C. To remove the malware. 

D. To perform repetitive or time-consuming task on a network. 

Answer:


Q89. Which of the following is the reason of properly securing an audit log? 

A. To ensure that only authorized person can check the log file. 

B. To ensure that no one can remove it as there is no back up is provided for this log. 

C. To ensure that potential hackers becomes unable to delete the event logs for covering their tracks. 

D. To ensure that potential hackers can be tracked easily without changing the network configuration. 

Answer:


Q90. Which of the following are types of password policies of Windows 7? Each correct answer represents a complete solution. Choose all that apply. 

A. Store Password Using Reversible Encryption 

B. Minimum Password Length 

C. User Name Length 

D. Password Must Meet Complexity Requirements 

Answer: ABD