Exam Details

  • Exam Code
    :98-367
  • Exam Name
    :Security Fundamentals
  • Certification
    :Microsoft Certifications
  • Vendor
    :Microsoft
  • Total Questions
    :277 Q&As
  • Last Updated
    :Mar 25, 2025

Microsoft Microsoft Certifications 98-367 Questions & Answers

  • Question 111:

    Which of the following security features of IE 7+ makes it more difficult for malware to be installed?

    A. Security zones

    B. Phishing filter

    C. Protected mode

    D. Pop-up blocker

  • Question 112:

    Which of the following is a collection or list of user accounts or computer accounts?

    A. Group

    B. Active Directory

    C. Domain

    D. Public folder

  • Question 113:

    Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to implement a method to ensure that the mobile devices are in a good state of security health when they are trying to access the corporate network. For this purpose, Mark is using NAP. Which of the following will he do for those computers in the network that are not compatible with NAP?

    A. Define exceptions in NAP for computers that are not compatible with NAP.

    B. Hide those computers that are not compatible with NAP.

    C. Remove those computers that are not compatible with NAP.

    D. Do not use the NAP, if any of the computers is showing incompatibility in the entire network.

  • Question 114:

    Mark works as a Security Officer for TechMart Inc. The company has a Windows- based network. He has bees assigned a project for ensuring the safety of the customer's money and information, not to mention the company's reputation. The company has gone through a security audit to ensure that it is in compliance with industry regulations and standards. Mark understands the request and has to do his due diligence for providing any information the regulators require as they are targeting potential security holes. In this situation, his major concern is the physical security of his company's system. Which of the following actions will Mark take to ensure the physical security of the company's desktop computers?

    A. Call a team member while behaving to be someone else for gaining access to sensitive information.

    B. Develop a social awareness of security threats within an organization.

    C. Use group policies to disable the use of floppy drives or USB drives.

    D. Provide protection against a Distributed Denial of Services attack.

  • Question 115:

    Mark works as a Desktop Administrator for TechMart Inc. The company has a Windows-based network. He has bees assigned a project to upgrade the browsers to Internet Explorer (IE) 8 for working with the latest Internet technologies Mark wants to ensure that the company uses a number of the security features built into the browser while maintaining functionality within the company's intranet. Mark is also educating his users to be good Internet citizens and use the safe web sur?ng. Mark asked his team to be assured that they are on a secured website. What they will do?

    A. Take a look for a padlock in the lower right corner of the browser and https:// in the address bar.

    B. Provide protection against a Distributed Denial of Services attack.

    C. Call a team member while behaving to be someone else for gaining access to sensitive information.

    D. Go into the Internet Options, select the Security, and add the intranet site to the list of Local Intranet Site.

  • Question 116:

    By default, what level of security is set for the Local intranet zone?

    A. High-Medium

    B. Medium-Low

    C. High

    D. Low

  • Question 117:

    Which of the following is a set of rules that control the working environment of user accounts and computer accounts?

    A. Mandatory Access Control

    B. Access control list

    C. Group Policy

    D. Intrusion detection system

  • Question 118:

    You check the logs on several clients and find that there is traffic coming in on an odd port (port 1872). All clients have the Windows XP firewall turned on. What should you do to block this unwanted traffic?

    A. Perform a virus scan to find the virus responsible for this traffic.

    B. Check the exceptions in the firewall and unselect that port exception.

    C. Trace back that traffic and find its origin.

    D. Shut down the service that connects to that port.

  • Question 119:

    Which of the following are required to enable for preventing the users from downloading and installing software from the Internet? Each correct answer represents a complete solution. Choose all that apply.

    A. Software restriction policies

    B. PTR record

    C. User Account Control

    D. Anti-Virus software

  • Question 120:

    Which of the following is the process used by attackers for listening to the network traffic?

    A. Eavesdropping

    B. Subnetting

    C. Sanitization

    D. Hacking

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 98-367 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.