Download Security Fundamentals.98-367.BrainDumps.2019-05-27.81q.vcex

Vendor: Microsoft
Exam Code: 98-367
Exam Name: Security Fundamentals
Date: May 27, 2019
File Size: 539 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
Windows Firewall is a built-in. host-based, stateless firewall. 
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
  1. Stateful
  2. Network layer
  3. Packet filter
  4. No change is needed
Correct answer: A
Question 2
Bridging is a process of sending packets from source to destination on OSI layer 3. 
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
  1. Routing
  2. Switching
  3. Repeating
  4. No change is needed.
Correct answer: A
Question 3
The primary purpose of Network Access Protection (NAP) is to prevent:
  1. Loss of data from client computers on a network.
  2. Non-compliant systems from connecting to a network.
  3. Users on a network from installing software.
  4. Unauthorized users from accessing a network.
Correct answer: B
Explanation:
NAP enforces health policies by inspecting and assessing the health of client computers, restricting network access when client computers are noncompliant with health policy, and remediating noncompliant client computers to bring them into compliance with health policy before they are granted full network access. NAP enforces health policies on client computers that are attempting to connect to a network; NAP also provides ongoing health compliance enforcement while a client computer is connected to a network. Reference: http://technet.microsoft.com/en-us/library/cc754378(v=ws.10).aspx
NAP enforces health policies by inspecting and assessing the health of client computers, restricting network access when client computers are noncompliant with health policy, and remediating noncompliant client computers to bring them into compliance with health policy before they are granted full network access. NAP enforces health policies on client computers that are attempting to connect to a network; NAP also provides ongoing health compliance enforcement while a client computer is connected to a network. 
Reference: http://technet.microsoft.com/en-us/library/cc754378(v=ws.10).aspx
Question 4
Many Internet sites that you visit require a user name and password.  
How should you secure these passwords?
  1. Save them to a text file
  2. Enable session caching
  3. Configure the browser to save passwords
  4. Save them to an encrypted file
  5. Reuse the same password
Correct answer: D
Question 5
To prevent users from copying data to removable media, you should:
  1. Lock the computer cases
  2. Apply a group policy
  3. Disable copy and paste
  4. Store media in a locked room
Correct answer: B
Explanation:
Reference: http://blogs.technet.com/b/askds/archive/2008/08/25/removable-storage-group-policy-and-windows-server-2008-and-windows-vista.aspx
Reference: http://blogs.technet.com/b/askds/archive/2008/08/25/removable-storage-group-policy-and-windows-server-2008-and-windows-vista.aspx
Question 6
You are an intern at Wide World Importers and help manage 1000 workstations. All the workstations are members of an Active Domain.  
You need to push out an internal certificate to Internet Explorer on all workstations.  
What is the quickest method to do this?
  1. Local policy
  2. Logon script
  3. Windows Update
  4. Group policy
Correct answer: A
Question 7
In Internet Explorer 8, the InPrivate Browsing feature prevents:
  1. Unauthorized private data input.
  2. Unencrypted communication between the client computer and the server.
  3. User credentials from being sent over the Internet.
  4. Any session data from being stored on the computer.
Correct answer: D
Explanation:
Reference: http://windows.microsoft.com/en-us/windows/what-is-inprivate-browsing
Reference: http://windows.microsoft.com/en-us/windows/what-is-inprivate-browsing
Question 8
The purpose of a digital certificate is to verify that a:
  1. Public key belongs to a sender.
  2. Computer is virus-free.
  3. Private key belongs to a sender.
  4. Digital document is complete.
Correct answer: A
Explanation:
In cryptography, a public key certificate (also known as a digital certificate or identity certificate) is an electronic document that uses a digital signature to bind a public key with an identity.
In cryptography, a public key certificate (also known as a digital certificate or identity certificate) is an electronic document that uses a digital signature to bind a public key with an identity.
Question 9
You are volunteering at an organization that gets a brand new web server. To make the server more secure, you should add a second administrator account. 
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
  1. Disable unused services
  2. Enable LM authentication
  3. Enable NTLM authentication
  4. No change is needed.
Correct answer: A
Question 10
Coho Winery wants to increase their web presence and hires you to set up a new web server. Coho already has servers for their business and would like to avoid purchasing a new one. 
Which server is best to use as a web server, considering the security and performance concerns?
  1. SQL Server
  2. File Server
  3. Domain Controller
  4. Application Server
Correct answer: C
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!