Exam Details

  • Exam Code
    :98-367
  • Exam Name
    :Security Fundamentals
  • Certification
    :Microsoft Certifications
  • Vendor
    :Microsoft
  • Total Questions
    :277 Q&As
  • Last Updated
    :Mar 25, 2025

Microsoft Microsoft Certifications 98-367 Questions & Answers

  • Question 11:

    This question requires that you evaluate the underlined text to determine if it is correct.

    Malware is any kind of unwanted software that is installed without your consent.

    Instructions: Review the underlined text. If it makes the statement correct, select "No change is needed". If the statement is incorrect, select the answer choice that makes the statement correct.

    A. Trojans are

    B. Worms are

    C. Viruses are

    D. No change is needed

  • Question 12:

    You are trying to enable BitLocker on your father's computer.

    What is the purpose of the Trusted Platform Module (TPM) when it is used by BitLocker?

    A. to store an encrypted file allocation table for the protected drive

    B. to provide a co-processor that encrypts/decrypts data

    C. to verify the integrity of the early boot components

    D. to store the hashed data produced by BitLocker encryption

  • Question 13:

    You have a new computer and want to restrict other people from replacing the operating system.

    Which action prevents a user from installing an alternate operating system by using physical media if the user has physical media if the user has physical access to the computer?

    A. installing drive-level encryption

    B. disabling removable devices and drives

    C. password protecting the computer BIOS

    D. removing the user from the administrators group

  • Question 14:

    You have an application that communicates by using plain text. You want to secure communications between the application and a server at the network layer. What should you implement?

    A. TLS

    B. SFTP

    C. SSH

    D. IPsec

  • Question 15:

    Which type of password attack attempts to guess passwords by using a list of common passwords?

    A. Keylogger

    B. brute force

    C. man-in-the-middle

    D. dictionary

  • Question 16:

    Malicious software designed to collect personally identifiable information is referred to as :

    A. spyware

    B. a cookie

    C. a network sniffer

    D. freeware

  • Question 17:

    This question requires that you evaluate the underlined text to determine if it is correct.

    To determine which action, if any, to take on an inbound message, anti-spam and antivirus recipient filtering inspects the IP address of the remote server that is trying to send messages.

    Instructions: Review the underlined text. If it makes the statement correct, select "No change is needed." If the statement is incorrect, select the answer choice that makes the statement correct.

    A. connection

    B. sender

    C. content

    D. No change is needed

  • Question 18:

    This question requires that you evaluate the underlined text to determine if it is correct.

    Dedicated perimeter firewalls often provide a service named static packet filtering, which converts interval private addresses into an external Internet address.

    Instructions: Review the underlined text. If it makes the statement correct, select "No change is needed." If the statement is incorrect, select the answer choice that makes the statement correct.

    A. Application Layer filtering

    B. Network Address Translation

    C. circuit-level inspection

    D. No change is needed

  • Question 19:

    This question requires that you evaluate the underlined text to determine if it is correct.

    An example of physical security for a laptop is a/an cable lock.

    Instructions: Review the underlined text. If it makes the statement correct, select "No change is needed." If the statement is incorrect, select the answer choice that makes the statement correct.

    A. docking station

    B. fingerprint reader

    C. external USB drive

    D. No change is needed

  • Question 20:

    What are two reasons to implement VLANs? (Choose two.)

    A. Manage traffic flow between the Internet and the network

    B. Create the most secure path between two hosts

    C. Enable grouping of hosts regardless of physical location

    D. Separate hosts on the same network

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 98-367 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.