Pass4itsure > Microsoft > MTA > 98-367 > 98-367 Online Practice Questions and Answers

98-367 Online Practice Questions and Answers

Questions 4

You suspect a user's computer is infected by a virus. What should you do first?

A. Restart the computer in safe mode

B. Replace the computer's hard disk drive

C. Disconnect the computer from the network

D. Install antivirus software on the computer

Buy Now
Questions 5

Dumpster diving refers to a physical threat that a hacker might use to look for information about a computer network.

Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

A. Phishing

B. Malware

C. Reverse Social engineering

D. No change is needed

Buy Now
Questions 6

Which attack listens to network traffic of a computer resource?

A. Resource gathering

B. Denial of service

C. ARP poisoning

D. Eavesdropping

E. Logic bomb

Buy Now
Questions 7

You have two servers that run Windows Server. All drives on both servers are formatted by using NTFS.

You move a file from one server to the other server. The file's permissions in the new location will:

A. Enable full access to the everyone group

B. Restrict access to the Administrators group

C. Inherit the destination folder's permissions

D. Retain the original folder's permissions

Buy Now
Questions 8

You need to be able to gather information about a running program.

Which type of auditing should you implement?

A. directory services

B. object access

C. logon events

D. process tracking

Buy Now
Questions 9

Which of the following is a collection or list of user accounts or computer accounts?

A. Group

B. Active Directory

C. Domain

D. Public folder

Buy Now
Questions 10

Which of the following can be implemented to decrease the number of times a user is required to be authenticated for access a particular resource?

A. TCP/IP protocol

B. Network Directory Access Protocol

C. Kerberos

D. Single Sign-on (SSO)

Buy Now
Questions 11

Which of the following security methods can be used to detect the DoS attack in order to enhance the security of the network?

A. Protocol analyzer

B. WIPS

C. WLAN controller

D. Spectrum analyzer

Buy Now
Questions 12

Which of the following operating systems have Windows Security Health Agent (SHA) on computers and report their status to the Security Health Validator (SHV)? Each correct answer represents a complete solution. Choose three.

A. Windows 2000 Professional

B. Windows Vista Business

C. Windows XP Service Pack 3

D. Windows 7 Professional

Buy Now
Questions 13

What displays a user's level of access to a particular file or folder on the server?

A. The Resultant Set of Policy

B. the object's Advanced Attributes

C. the object's Effective Permissions

D. the client computer's registry

Buy Now
Exam Code: 98-367
Exam Name: Security Fundamentals
Last Update: Mar 20, 2024
Questions: 277
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99