Exam Details

  • Exam Code
    :98-367
  • Exam Name
    :Security Fundamentals
  • Certification
    :Microsoft Certifications
  • Vendor
    :Microsoft
  • Total Questions
    :277 Q&As
  • Last Updated
    :Mar 25, 2025

Microsoft Microsoft Certifications 98-367 Questions & Answers

  • Question 131:

    You want to standardize security throughout your network. You primarily use Microsoft operating systems for servers and workstations. What is the best way to have standardized security (i.e. same password policies, lockout policies, etc.) throughout the network on clients and servers?

    A. Publish the desired policies to all employees directing them to implement according to policy.

    B. Configure each computer to adhere to the standard policies.

    C. When installing new workstations or servers, image a machine that has proper security settings and install the new machine with that image.

    D. Utilize Windows Security Templates for all computers.

  • Question 132:

    Which of the following protects against unauthorized access to confidential information via encryption and works at the network layer?

    A. Firewall

    B. NAT

    C. IPSec

    D. MAC address

  • Question 133:

    Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network. The company is adding an open, high-speed, wireless access for their customers and secured wireless for employees at all 37 branches. He wants to check the various security concerns for ensuring that business traffic is secured. He is also in under pressure to make this new feature a winning strategy for a company. Mark wants the employees to be free to troubleshoot their own wireless connections before contacting him. Which of the following is the basic troubleshooting step that he can ask them to do?

    A. To power cycle the wireless access points and then reboot the systems.

    B. To configure the network to use only Extensible Authentication Protocol (EAP).

    C. To reboot the computers they are using and then use the MAC filtering.

    D. To right-click the network icon in the system tray and then select Troubleshoot Problems.

  • Question 134:

    Mark works as a Systems Administrator for TechMart Incl. The company has Windows-based network. Mark has been assigned a project to track who tries to log into the system and the time of the day at which the attempts occur. He is also required to create a system to track when confidential files are opened and who is trying to open it. Now, Mark logs when someone is not able to make a successful attempt to log into the system as Administrator but he also wants to log when the user is successful to log into the system as Administrator. Which of the following is the reason of logging by Mark when a user is successfully logged into the system as well as when he is failed?

    A. To determine if and when someone is authenticating successfully with high privilege.

    B. To make sure that user is not using the Administrator account.

    C. To determine if and when someone is authenticating successfully with high privilege.

    D. To make sure that user is not facing any problem.

  • Question 135:

    Which of the following contains a tree of domain names?

    A. Domain name space

    B. Domain name formulation

    C. Domain Name System

    D. Authoritative name server

  • Question 136:

    Which of the following is a process in which data is changed before or while it is entered into a computer system?

    A. Data diddling

    B. Authentication

    C. Domain kiting

    D. Packet sniffing

  • Question 137:

    You have an application that uses IPsec to secure communications between an Internet client and a server on the internal network.

    To which network security service must the IPsec client connect?

    A. SFTP

    B. SSH

    C. VPN

    D. RADIUS

  • Question 138:

    You want to prevent external users from acquiring information about your network. You should implement a:

    A. router

    B. layer-3 switch

    C. firewall

    D. proxy server

  • Question 139:

    A malicious user who intercepts and modifies communications is known as a:

    A. red hat hacker

    B. white hat hacker

    C. network sniffer

    D. man-in-the-middle

  • Question 140:

    You need to hide internal IP addresses from the Internet while maintaining client access to the Internet.

    What should you implement?

    A. Port forwarding

    B. Secure Sockets Layer (SSL)

    C. Access Control Lists

    D. Network Address Translation (NAT)

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 98-367 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.