Certbus > Microsoft > Microsoft Certifications > 98-367 > 98-367 Online Practice Questions and Answers

98-367 Online Practice Questions and Answers

Questions 4

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

Hot Area:

Browse 277 Q&As
Questions 5

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

Hot Area:

Browse 277 Q&As
Questions 6

An employee where you work is unable to access the company message board in Internet Explorer. You review her Internet Options dialog box, as shown in the following image:

Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.

Hot Area:

Browse 277 Q&As
Questions 7

To prevent users from copying data to removable media, you should:

A. Lock the computer cases

B. Apply a group policy

C. Disable copy and paste

D. Store media in a locked room

Browse 277 Q&As
Questions 8

A group of users has access to Folder A and all of its contents. You need to prevent some of the users from accessing a subfolder inside Folder A.

What should you do first?

A. Disable folder sharing

B. Hide the folder

C. Change the owner

D. Block inheritance

Browse 277 Q&As
Questions 9

You need to limit the programs that can run on client computers to a specific list. Which technology should you implement?

A. Windows Security Center

B. Security Accounts Manager

C. System Configuration Utility

D. AppLocker group policies

Browse 277 Q&As
Questions 10

Humongous Insurance is an online healthcare insurance company. During an annual security audit a security firm tests the strength of the company's password policy and suggests that Humongous Insurance implement password history policy.

What is the likely reason that the security firm suggests this?

A. Past passwords were easily cracked by the brute force method.

B. Past passwords of users contained dictionary words.

C. Previous password breaches involved use of past passwords.

D. Past passwords lacked complexity and special characters.

Browse 277 Q&As
Questions 11

To keep third-party content providers from tracking your movements on the web, enable InPrivate Browsing.

Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.

A. InPrivate Filtering

B. SmartScreen Filter

C. Compatibility Mode

D. No change is needed

Browse 277 Q&As
Questions 12

You suspect a user's computer is infected by a virus. What should you do first?

A. Restart the computer in safe mode

B. Replace the computer's hard disk drive

C. Disconnect the computer from the network

D. Install antivirus software on the computer

Browse 277 Q&As
Questions 13

You create a new file in a folder that has inheritance enabled. By default, the new file:

A. Takes the permissions of the parent folder

B. Does not take any permissions

C. Takes the permissions of other folders in the same directory

D. Takes the permissions of other files in the same directory

Browse 277 Q&As
Questions 14

Windows Server Update Services (WSUS) is a tool that:

A. Updates data stored in Windows servers

B. Manages the services that run on a server

C. Updates licensing for Windows servers

D. Manages updates for Microsoft software

Browse 277 Q&As
Questions 15

Media Access Control (MAC) filtering enables you to:

A. limit access to a network based on the client computer's network adapter.

B. set access permissions to a shared folder.

C. prevent communications between specific IP addresses.

D. restrict communications to a specific website.

Browse 277 Q&As
Questions 16

Which of the following are the main features of a key logger? Each correct answer represents a complete solution. Choose all that apply.

A. It can be delivered via FTP or e-mail.

B. It can record all keystrokes.

C. It can capture all screenshots.

D. It can detect viruses on the computer.

Browse 277 Q&As
Questions 17

Which of the following is method that can be used to identify Internet software in Software Restriction Policies?

A. Restriction rule

B. Identification rule

C. Internet rule

D. Zone rule

Browse 277 Q&As
Questions 18

What are three ways you can reduce the number of opportunities that attackers have to exploit potential weaknesses or vulnerabilities? (Choose three.)

A. Employ layered defenses

B. Elevate all accounts to administrator accounts

C. Apply the principle of least privilege

D. Employ content filtering for web browsers

E. Restrict access to system services

Browse 277 Q&As
Exam Code: 98-367
Exam Name: Security Fundamentals
Last Update: Mar 13, 2025
Questions: 277 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99