Exam Details

  • Exam Code
    :98-367
  • Exam Name
    :Security Fundamentals
  • Certification
    :Microsoft Certifications
  • Vendor
    :Microsoft
  • Total Questions
    :277 Q&As
  • Last Updated
    :Mar 25, 2025

Microsoft Microsoft Certifications 98-367 Questions & Answers

  • Question 41:

    Mark works as a Security Administrator for TechMart Inc. The company has a a Windows-based network. Mark has gone through a security audit for ensuring that the technical system is secure and protected. While this audit, he identified many areas that need improvement. He wants to minimize the risk for potential security threats by educating team members in the area of social engineering, and providing basic security principle knowledge while stressing the Con?dentiality, Integrity, and Availability triangle in the training of his team members . Which of the following ways will Mark use for educating his team members on the social engineering process?

    A. He will call a team member while behaving to be someone else for gaining access to sensitive information.

    B. He will use group policies to disable the use of floppy drives or USB drives.

    C. He will develop a social awareness of security threats within an organization.

    D. He will protect against a Distributed Denial of Services attack.

  • Question 42:

    Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to implement a method to ensure that the mobile devices are in a good state of security health when they are trying to access the corporate network. Which of the following is a control or strategy that Mark will implement to assure the security health?

    A. TCP/IP protocol

    B. Kerberos

    C. Single Sign On

    D. Network Access Protection

  • Question 43:

    Which of the following is a physical address stored in the Network Interface card on your system or any other device residing on your network?

    A. IP address

    B. I/O address

    C. MAC Address

    D. Broadcast address

  • Question 44:

    John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation? Each correct answer represents a complete solution. Choose all that apply.

    A. He should restore his Windows settings.

    B. He should upgrade his antivirus program.

    C. He should observe the process viewer (Task Manager) to see whether any new process is running on the computer or not. If any new malicious process is running, he should kill that process.

    D. He should download the latest patches for Windows Server 2003 from the Microsoft site, so that he can repair the kernel.

  • Question 45:

    Which of the following can be used to implement two-factor authentications? Each correct answer represents a complete solution. Choose all that apply.

    A. Firewall security rule

    B. Password

    C. Smart card

    D. Encrypted network configuration

  • Question 46:

    Which of the following is a mechanism that allows authentication of dial-in and other network connections?

    A. VPN

    B. NTFS

    C. RADIUS

    D. Single Sign-On

  • Question 47:

    Which of the following tools traces all or specific activities of a user on a computer?

    A. Task Manager

    B. Event Viewer

    C. Network Monitor

    D. Keylogger

  • Question 48:

    On which of the following is the level of security set for an Internet zone applied?

    A. To the sites that you have specifically indicated as the ones that you trust.

    B. To all the Websites by default.

    C. To the sites that might potentially damage your computer, or your information.

    D. To the Websites and content that are stored on a corporate or business network.

  • Question 49:

    Which of the following security methods can be used to detect the DoS attack in order to enhance the security of the network?

    A. Protocol analyzer

    B. WIPS

    C. WLAN controller

    D. Spectrum analyzer

  • Question 50:

    Which of the following is the most common method for an attacker to spoof email?

    A. Back door

    B. Replay attack

    C. Man-in-the-middle attack

    D. Open relay

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 98-367 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.