Download Security Fundamentals.98-367.CertKey.2019-03-04.74q.vcex

Vendor: Microsoft
Exam Code: 98-367
Exam Name: Security Fundamentals
Date: Mar 04, 2019
File Size: 56 KB
Downloads: 2

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
Windows Firewall is a built-in. host-based, stateless firewall. 
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
  1. Stateful
  2. Network layer
  3. Packet filter
  4. No change is needed
Correct answer: A
Question 2
The primary purpose of Network Access Protection (NAP) is to prevent:
  1. Loss of data from client computers on a network.
  2. Non-compliant systems from connecting to a network.
  3. Users on a network from installing software.
  4. Unauthorized users from accessing a network.
Correct answer: B
Explanation:
NAP enforces health policies by inspecting and assessing the health of client computers, restricting network access when client computers are noncompliant with health policy, and remediating noncompliant client computers to bring them into compliance with health policy before they are granted full network access. NAP enforces health policies on client computers that are attempting to connect to a network; NAP also provides ongoing health compliance enforcement while a client computer is connected to a network. Reference: http://technet.microsoft.com/en-us/library/cc754378(v=ws.10).aspx
NAP enforces health policies by inspecting and assessing the health of client computers, restricting network access when client computers are noncompliant with health policy, and remediating noncompliant client computers to bring them into compliance with health policy before they are granted full network access. NAP enforces health policies on client computers that are attempting to connect to a network; NAP also provides ongoing health compliance enforcement while a client computer is connected to a network. 
Reference: http://technet.microsoft.com/en-us/library/cc754378(v=ws.10).aspx
Question 3
You want to make your computer resistant to online hackers and malicious software.  
What should you do?
  1. Configure a forward proxy.
  2. Install anti-virus software.
  3. Enable spam filtering.
  4. Turn on Windows Firewall.
Correct answer: B
Question 4
Many Internet sites that you visit require a user name and password.  
How should you secure these passwords?
  1. Save them to a text file
  2. Enable session caching
  3. Configure the browser to save passwords
  4. Save them to an encrypted file
  5. Reuse the same password
Correct answer: D
Question 5
You are an intern at Wide World Importers and help manage 1000 workstations. All the workstations are members of an Active Domain.  
You need to push out an internal certificate to Internet Explorer on all workstations.  
What is the quickest method to do this?
  1. Local policy
  2. Logon script
  3. Windows Update
  4. Group policy
Correct answer: A
Question 6
In Internet Explorer 8, the InPrivate Browsing feature prevents:
  1. Unauthorized private data input.
  2. Unencrypted communication between the client computer and the server.
  3. User credentials from being sent over the Internet.
  4. Any session data from being stored on the computer.
Correct answer: D
Explanation:
Reference: http://windows.microsoft.com/en-us/windows/what-is-inprivate-browsing
Reference: http://windows.microsoft.com/en-us/windows/what-is-inprivate-browsing
Question 7
The purpose of a digital certificate is to verify that a:
  1. Public key belongs to a sender.
  2. Computer is virus-free.
  3. Private key belongs to a sender.
  4. Digital document is complete.
Correct answer: A
Explanation:
In cryptography, a public key certificate (also known as a digital certificate or identity certificate) is an electronic document that uses a digital signature to bind a public key with an identity.
In cryptography, a public key certificate (also known as a digital certificate or identity certificate) is an electronic document that uses a digital signature to bind a public key with an identity.
Question 8
A mail system administrator scans for viruses in incoming emails to increase the speed of mail processing. 
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
  1. Decrease the chances of a virus getting to a client machine
  2. Verify that the senders of the messages are legitimate
  3. Ensure that all links in the messages are trustworthy
  4. No change is needed.
Correct answer: A
Question 9
Role separation improves server security by:
  1. Enforcing principle of least privilege.
  2. Installing applications on separate hard disks.
  3. Physically separating high security servers from other servers.
  4. Placing servers on separate VLANs.
Correct answer: A
Question 10
The Windows Firewall protects computers from unauthorized network connections. 
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.
  1. Email viruses
  2. Phishing scams
  3. Unencrypted network access
  4. No change is needed
Correct answer: D
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!