Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > Microsoft > Microsoft Certifications > 98-367 > 98-367 Online Practice Questions and Answers

98-367 Online Practice Questions and Answers

Questions 4

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

Hot Area:

Buy Now

Correct Answer:

Questions 5

DRAG DROP

Certain potentially harmful file types should be filtered as attachments of incoming email messages.

Match the file extension that should be filtered with its description.

Instructions: To answer, drag the appropriate file extension from the column on the left to its description on the right. Each file extension may be used once, more than once, or not at all. You may need to drag the split bar between panes or

scroll to view content.

Note: For each correct selection is worth one point.

Select and Place:

Buy Now

Correct Answer:

Questions 6

A digitally signed e-mail message:

A. Validates the recipient

B. Validates the sender

C. Is encrypted

D. Is virus-free

Buy Now

Correct Answer: B

By digitally signing a message, you apply your unique digital mark to the message. The digital signature includes your certificate and public key. This information proves to the recipient that you signed the contents of the message and not an imposter, and that the contents have not been altered in transit. Reference: http://office.microsoft.com/en-us/outlook-help/secure-messages-with-a-digital-signature-HP001230539.aspx

Questions 7

The primary method of authentication in an SSL connection is passwords.

To answer, choose the option "No change is needed" if the underlined text is correct. If the underlined text is not correct, choose the correct answer.

A. No change is needed

B. Certificates

C. IPsec

D. Biometrics

Buy Now

Correct Answer: B

Reference: https://www.geocerts.com/ssl/understanding_authentication

Questions 8

E-mail spoofing:

A. Forwards e-mail messages to all contacts

B. Copies e-mail messages sent from a specific user

C. Obscures the true e-mail sender

D. Modifies e-mail routing logs

Buy Now

Correct Answer: C

Reference: http://www.microsoft.com/mscorp/safety/technologies/senderid/technology.mspx

Questions 9

You suspect a user's computer is infected by a virus. What should you do first?

A. Restart the computer in safe mode

B. Replace the computer's hard disk drive

C. Disconnect the computer from the network

D. Install antivirus software on the computer

Buy Now

Correct Answer: D

Questions 10

A malicious user who intercepts and modifies communications is known as a:

A. red hat hacker

B. white hat hacker

C. network sniffer

D. man-in-the-middle

Buy Now

Correct Answer: D

Questions 11

Which of the following infects the computer and then hides itself from detection by antivirus software?

A. EICAR virus

B. Boot-sector virus

C. Macro virus

D. Stealth virus

Buy Now

Correct Answer: D

A stealth virus is a file virus. It infects the computer and then hides itself from detection by antivirus software. It uses various mechanisms to avoid detection by antivirus software. It hides itself in computer memory after infecting the computer.

It also masks itself from applications or utilities. It uses various tricks to appear that the computer has not lost any memory and the file size has not been changed. The virus may save a copy of original and uninfected data. When the anti-virus

program tries to check the files that have been affected, the virus shows only the uninfected data. This virus generally infects .COM and .EXE files. Answer: B is incorrect. A boot sector virus infects the master boot files of the hard disk or

floppy disk. Boot record programs are responsible for booting the operating system and the boot sector virus copies these programs into another part of the hard disk or overwrites these files. Therefore, when the floppy or the hard disk boots,

the virus infects the computer.

Answer: C is incorrect. A macro virus is a virus that consists of a macro code which infects the system. A Macro virus can infect a system rapidly. Since this virus has VB event handlers, it is dynamic in nature and displays random activation.

The victim has only to open a file having a macro virus in order to infect the system with the virus. DMV, Nuclear, and Word Concept are some good examples of macro viruses.

Answer: A is incorrect. The EICAR (EICAR Standard Anti-Virus Test File) virus is a file that is used to test the response of computer antivirus (AV) programs. The rationale behind it is to allow people, companies, and antivirus programmers to

test their software without having to use a real computer virus that could cause actual damage should the antivirus not respond correctly. The file is simply a text file of either 68 or 70 bytes that is a legitimate executable file called a COM file

that can be run by Microsoft operating systems and some work-alikes (except for 64-bit due to 16-bit limitations), including OS/2. When executed, it will print "EICAR- STANDARD-ANTIVIRUS-TEST-FILE!" and then stop. The string used in

the EICAR virus is as follows:

Questions 12

In which of the following is the file audit events are written when auditing is enabled?

A. File system ACL

B. Biometric device

C. Network Access Control List

D. Security event log

Buy Now

Correct Answer: D

The various enabled file auditing events are documented and written in the security event log Answer: A is incorrect. A filesystem ACL is deifned as a data structure (usually a table) that contains entries specifying individual user or group rights to specific system objects like programs, processes, or files. These entries are known as access control entries (ACEs) in the Microsoft Windows NT, OpenVMS, Unix-like, and Mac OS X operating systems and each of the accessible object contains an identifier to its ACL. The permissions are used to find the particular access rights, such as whether a user is able to read from, write to, or execute an object. Answer: C is incorrect. Network Access Control List is defined as a set of rules applied to port numbers or network daemon names that are available on a host or other layer 3, and attached with a list of hosts and networks permitted to use the various defined service. The individual servers and routers can have network ACLs. It is used to control both inbound and outbound traffic as firewall does. Answer: B is incorrect. A biometric device is used for uniquely recognizing humans based upon one or more intrinsic, physical, or behavioral traits. Biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. Biometric characteristics can be divided into two main classes: 1.Physiological: These devices are related to the shape of the body. These are not limited to the fingerprint, face recognition, DNA, hand and palm geometry, and iris recognition, which has largely replaced the retina and odor/scent. 2.Behavioral: These are related to the behavior of a person. They are not limited to the typing rhythm, gait, and voice.

Questions 13

Which of the following are the features of security level in the Restricted Sites zone

A. The protection against harmful content is provided.

B. The maximum safeguards are used.

C. Most of the features are disabled.

D. The default security level is low.

Buy Now

Correct Answer: ABC

Answer: C, B, and A

The various features of security level in the Restricted Sites zone are as follows:

1.The default security level is high.

2.Most of the features are disabled.

3.The maximum safeguards are used.

4.The protection against harmful content is provided.

Exam Code: 98-367
Exam Name: Security Fundamentals
Last Update: Jun 12, 2025
Questions: 277

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.