Exam Details

  • Exam Code
    :98-367
  • Exam Name
    :Security Fundamentals
  • Certification
    :Microsoft Certifications
  • Vendor
    :Microsoft
  • Total Questions
    :277 Q&As
  • Last Updated
    :Mar 25, 2025

Microsoft Microsoft Certifications 98-367 Questions & Answers

  • Question 91:

    Which of the following practices should be followed to keep passwords secure? Each correct answer represents a complete solution. Choose three.

    A. Change the passwords whenever there is suspicion that they may have been compromised.

    B. A password should be alpha-numeric.

    C. A password should not be more than five words.

    D. Never write down a password.

  • Question 92:

    Which of the following is the edge between the private and locally managed-and- owned side of a network and the public side that is commonly managed by a service provider?

    A. Internet

    B. Network perimeter

    C. Intranet

    D. VLAN

  • Question 93:

    Which of the following types of viruses protects itself from antivirus programs and is more difficult to trace?

    A. Armored virus

    B. MBR virus

    C. Boot sector virus

    D. Macro virus

  • Question 94:

    Mark works as a Security Officer for TechMart Inc. The company has a Windows- based network. He has bees assigned a project for ensuring the safety of the customer's money and information, not to mention the company's reputation. The company has gone through a security audit to ensure that it is in compliance with industry regulations and standards. Mark understands the request and has to do his due diligence for providing any information the regulators require as they are targeting potential security holes. In this situation, his major concern is the physical security of his company's system. He has a concern that people are authenticated to the servers in the data center. Which of the following actions will Mark take to prevent normal users from logging onto the systems?

    A. Call a team member while behaving to be someone else for gaining access to sensitive information.

    B. Use group policies to disable the use of floppy drives or USB drives.

    C. Provide protection against a Distributed Denial of Services attack.

    D. Develop a social awareness of security threats within an organization.

  • Question 95:

    Sam works as a Web Developer for McRobert Inc. He wants to control the way in which a Web browser receives information and downloads content from Web sites. Which of the following browser settings will Sam use to accomplish this?

    A. Security

    B. Certificate

    C. Cookies

    D. Proxy server

  • Question 96:

    You are taking over the security of an existing network. You discover a machine that is not being used as such, but has software on it that emulates the activity of a sensitive database server. What is this?

    A. A Polymorphic Virus

    B. A Honey Pot

    C. A reactive IDS.

    D. A Virus

  • Question 97:

    Your Web server crashes at exactly the point where it reaches 1 million total visits. You discover the cause of the server crash is malicious code. Which description best fits this code?

    A. Virus

    B. Worm

    C. Polymorphic Virus

    D. Logic Bomb

  • Question 98:

    You work as a Network Administrator for NetTech Inc. You want to prevent users from accessing the graphical user interface (GUI) on the computers in the network. What will you do to accomplish this task?

    A. Implement a remote access policy

    B. Implement a group policy

    C. Apply NTFS permission

    D. Implement an account policy

  • Question 99:

    Which of the following ports is used by the IMAP4 protocol?

    A. 443

    B. 53

    C. 143

    D. 110

  • Question 100:

    You work as a network administrator for an insurance company called InZed Inc. The company has developed a corporate policy that requires all machines to use the IPSec security protocol. If the computer they are logging in from does not follow this corporate policy, they will be denied access to the network. Which of the following can you set up to help enforce the corporate policy?

    A. Server Access Protection

    B. System Center Data Protection Manager (DPM)

    C. Microsoft Assessment and Planning (MAP) Toolkit

    D. Network Access Protection

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 98-367 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.