How to pass Microsoft 98-367 Real Exam in 24 Hours [download 17-32]

Exam Code: 98-367 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: MTA Security Fundamentals Practice Test
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 98-367 Exam.

2016 Apr 98-367 Study Guide Questions:

Q17. Which of the following viruses infects Word 97 documents and the NORMAL.DOT file of Word 97 and Word 2000? 

A. Chernobyl 

B. Brain 

C. EICAR 

D. Melissa 

Answer: D 


Q18. Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?

A. Static NAT

B. Port Address Translation (PAT)

C. Dynamic NAT

D. Cache NAT

Answer: C


Q19. Which of the following is the process used by attackers for listening to the network traffic? 

A. Eavesdropping 

B. Subnetting 

C. Sanitization 

D. Hacking 

Answer: A 


Q20. Mark works as a Desktop Administrator for TechMart Inc. The company has a Windows-based network. He has bees assigned a project to upgrade the browsers to Internet Explorer (IE) 8 for working with the latest Internet technologies Mark wants to ensure that the company uses a number of the security features built into the browser while maintaining functionality within the company's intranet. Mark is also educating his users to be good Internet citizens and use the safe web sur?ng. Which of the following actions will Mark take to configure Internet zone feature in IE 8 and to enable users to easily browse the local intranet without disturbing the security levels? 

A. Develop a social awareness of security threats within an organization. 

B. Call a team member while behaving to be someone else for gaining access to sensitive information. 

C. Provide protection against a Distributed Denial of Services attack. 

D. Go into the Internet Options, select the Security, and add the intranet site to the list of Local Intranet Site. 

Answer: D 


Q21. The stronger password is a critical element in the security plan. Which of the following are the characteristics used to make up a strong password? 

A. It contains more than seven hundred characters and does not contain the user name, real name, or any name that can be guessed by the attacker easily. 

B. It contains more than seven characters and does not contain the user name, real name, or anyname that can be guessed by the attacker easily. 

C. It contains the user name, real name, or any name that can be remembered easily and does not contain more than seven characters. 

D. It contains more than seven characters and the user name, real name, or any name. 

Answer: B 


98-367 torrent

Renewal 98-367 practice:

Q22. Which of the following works at the network layer and hides the local area network IP address and topology?

A. Network address translation (NAT) 

B. MAC address 

C. Hub 

D. Network interface card (NIC) 

Answer: A 


Q23. Which of the following are the main features of a key logger? Each correct answer represents a complete solution. Choose all that apply. 

A. It can be delivered via FTP or e-mail. 

B. It can record all keystrokes. 

C. It can capture all screenshots. 

D. It can detect viruses on the computer. 

Answer: ABC 


Q24. Which of the following are the Internet Explorer security zones? Each correct answer represents a complete solution. Choose three. 

A. Trusted sites 

B. Internet 

C. Local intranet 

D. Extranet 

Answer: ABC 


Q25. Which of the following security zones is used for Web sites that the user does not trust? 

A. Internet zone 

B. Trusted zone 

C. Restricted zone 

D. Local Intranet zone 

Answer: C 


Q26. Which of the following is a Windows configuration option that enables administrators to restrict

communication among domain members only?

A. Demilitarized zone

B. Server isolation

C. Domain isolation

D. Domain kiting

Answer: C 


98-367 practice exam

Actual 98-367 ebook:

Q27. Which of the following are the types of group scopes? Each correct answer represents a complete solution. Choose all that apply. 

A. Global 

B. Domain Users 

C. Universal 

D. Domain local 

Answer: ACD 


Q28. Which of the following is method that can be used to identify Internet software in Software Restriction Policies? 

A. Restriction rule 

B. Identification rule 

C. Internet rule 

D. Zone rule 

Answer: D 


Q29. You work as a security manager for Company Inc. An individual is connecting to your corporate internal network over the Internet. You have to ensure that he is not an intruder masquerading as an authorized user. Which of the following technologies will you use to accomplish the task? 

A. Two-factor authentication 

B. IP address packet filtering 

C. Intrusion detection system (IDS) 

D. Embedded digital signature 

Answer: A 


Q30. You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network. You plan to connect your company's LAN to the Internet. You are concerned about the security of your network and want to protect it against external access and misuse. Which device will you install between your LAN and the Internet to accomplish this? 


Answer: 


Q31. You work as a Network Administrator for TechMart Inc. The company has a Windows-based network. After completing a security audit of the company's Microsoft Windows Server 2008 R2 file servers, you have determined that folder and share security requires a revision on the basis of corporate reorganization. You have noticed that some shares on the file system are not secured. Which of the following is the default permission setting that you have used when a share is created? 

A. Everyone with Change permission 

B. Administrators with the Full Control permission 

C. Administrators with the Change permission 

D. Everyone with Read permission 

Answer: D 


Q32. Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network uses Network Access Protection (NAP). The company's employees at the remote locations are connecting to the company's network from their Windows Vista clients. Mark wants to ensure that the data transmission between a client computer and the company's network is as secure as possible. What will Mark do to accomplish the task? 

A. Use Encrypting File System (Efs) between the client computer and the company's network. 

B. Use IPSec NAP policy between client computer and the company's network. 

C. Use VPN connection with MS-CHAP v2 between the client computer and the company's network. 

D. Use NAP enforcement for DHCP. 

Answer: B