[Highest Quality] 98-367 Microsoft sample question 81-96 (Apr 2016)

Exam Code: 98-367 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: MTA Security Fundamentals Practice Test
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 98-367 Exam.

2016 Apr 98-367 Study Guide Questions:

Q81. The workstations on your network utilize Windows XP (service pack 2 or later). Many users take their laptops on the road. You are very concerned about the security and want to have a robust firewall solution for mobile users. You have decided that all your firewalls to use the Stateful Packet Inspection (SPI) method. What must you do to provide SPI to your mobile users? 

A. You must purchase a third party firewall solution for your mobile users. 

B. Do nothing. Windows XP service pack 2 has a firewall turned on by default. 

C. Configure the Windows XP firewall to use SPI. 

D. Download the SPI template from Microsoft. 

Answer: A 


Q82. Which of the following is a use of Microsoft Windows Malicious Software Removal Tool? 

A. To gain unauthorized remote access to a computer and launch additional attacks. 

B. To distribute itself automatically from one computer to another via network connections. 

C. To remove the malware. 

D. To perform repetitive or time-consuming task on a network. 

Answer: C 


Q83. Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. Mark configures Network Access Protection (NAP) on the network. He then configures secure wireless access to the network from all access points on the network. He also configures 802.1x authentication for accessing the network. Mark wants to ensure that all computers connecting to the network are checked by NAP for the required configuration and update status. What will Mark do to accomplish the task? 

A. Configure all computers connecting to the network with IPSec. 

B. Configure all access points as RADIUS clients to Distributed File System. 

C. Configure Link-local Multicast Name Resolution (LLMNR) on the network. 

D. Configure all access points as RADIUS clients to Network Policy Server (NPS). 

Answer: D 


Q84. Which of the following are indications of a virus attack on a computer? Each correct answer represents a complete solution. Choose three. 

A. Although the computer has sufficient memory, an out-of-memory error message is displayed. 

B. The applications installed on the computer system work properly. 

C. An antivirus program is not able to run. 

D. The computer runs slower than usual and stops responding. 

Answer: ACD 


Q85. You are responsible for virus protection for a large college campus. You are very concerned that your antivirus solution must be able to capture the latest virus threats. What sort of virus protection should you implement? 

A. Network Based 

B. Host based 

C. Dictionary 

D. Heuristic 

Answer: D 


98-367 test questions

Far out 98-367 testing engine:

Q86. Mark works as a Network Administrator for BlueWell Inc. The company has a Windows-based network. Mark has retained his services to perform a security assessment of the company's network that has various servers exposed to the Internet. So, it may be vulnerable to an attack. Mark is using a single perimeter ?rewall, but he does not know if that is enough. He wants to review the situation and make some reliable recommendations so that he can protect the data over company's network. Which of the following will Mark do to accomplish the task? 

A. Outsource the related services. 

B. Encrypt the data and than start transmission. 

C. Locate the Internet-exposed servers and devices in an internal network. 

D. Create a perimeter network to isolate the servers from the internal network. 

Answer: D 


Q87. Which of the following states that a user should never be given more privileges than are required to

carry out a task?

A. Security through obscurity

B. Segregation of duties

C. Principle of least privilege

D. Role-based security

Answer: C 


Q88. Which of the following can be used to implement two-factor authentications? Each correct answer represents a complete solution. Choose all that apply. 

A. Firewall security rule 

B. Password 

C. Smart card 

D. Encrypted network configuration 

Answer: BC 


Q89. Which of the following MMC snap-in consoles is used to administer domain and forest functional levels and user principal name (UPN) suffixes? 

A. Group Policy Management Console 

B. Active Directory Domains and Trusts 

C. Active Directory Sites and Services 

D. Active Directory Administrative Center 

Answer: B 


Q90. Mark work as a System Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to allow the remote travel agents to be able to access the corporate network so that they are free to check email and post appointments that are booked for the particular day.

Mark has decided to permit the travel agents to use their home computers but he is required to be assured that the information is not compromised by anyone because the security of client information is on the top priority for him. Mark is concerned about probable attackers will be able to penetrate the VPN. Which of the following will Mark use to attract the attackers for understanding their methods?

A. CIA Triangle

B. Attack surface

C. Honeypot

D. Social engineering

Answer: C


98-367 free practice test

Approved 98-367 preparation exams:

Q91. Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based network. Mark wants to implement stronger authentication measures for the customers, as well as eliminate IT staff from logging on with high privileges. Mark has various options, but he is required to keep the processes easy for the helpdesk staff. Which of the following is a service can the staff uses as an alternative of signing in with elevate privileges? 

A. Secondary Logon-Run As 

B. Security log 

C. Hardware firewall 

D. Encrypted network configuration 

Answer: A 


Q92. Which of the following is defined as a digitally signed statement used to authenticate and to secure information on open networks? 

A. Kerberos 

B. Public certificate 

C. Single sign-on (SSO) 

D. SEAL 

Answer: B 


Q93. Which of the following tools traces all or specific activities of a user on a computer?

A. Task Manager

B. Event Viewer

C. Network Monitor

D. Keylogger

Answer: D


Q94. Which of the following viruses cannot be detected by the signature-based antivirus? 

A. Polymorphic 

B. MBR virus 

C. Boot sector 

D. Macro 

Answer: A 


Q95. Which of the following is an authentication protocol? 

A. Kerberos 

B. LDAP 

C. TLS 

D. PPTP 

Answer: A 


Q96. You work as a Network Administrator for a medium sized business. Spam has become a significant problem for your company. You want to have a common network wide solution. You want a solution that is easy to administer. However, you do not want your solution to hinder the performance of your email server. What is the best solution for you to implement?

A. Utilize a client side anti-spam solution.

B. Use a combination of mail server engine and client side.

C. Utilize a gateway filter anti-spam solution.

D. Utilize a mail server engine anti-spam solution.

Answer: C