Exam Code: 98-367
Exam Name: Security Fundamentals
Updated: Dec 14, 2024
Q&As: 277
At Passcerty.com, we pride ourselves on the comprehensive nature of our 98-367 exam dumps, designed meticulously to encompass all key topics and nuances you might encounter during the real examination. Regular updates are a cornerstone of our service, ensuring that our dedicated users always have their hands on the most recent and relevant Q&A dumps. Behind every meticulously curated question and answer lies the hard work of our seasoned team of experts, who bring years of experience and knowledge into crafting these premium materials. And while we are invested in offering top-notch content, we also believe in empowering our community. As a token of our commitment to your success, we're delighted to offer a substantial portion of our resources for free practice. We invite you to make the most of the following content, and wish you every success in your endeavors.
Experience Passcerty.com exam material in PDF version.
Simply submit your e-mail address below to get started with our PDF real exam demo of your Microsoft 98-367 exam.
Instant download
Latest update demo according to real exam
What is the primary advantage of using Active Directory Integrated Zones?
A. Zone encryption
B. Password protection
C. Non-repudiation
D. Secure replication
E-mail bombing attacks a specific entity by:
A. Redirecting all e-mail to another entity
B. Sending high volumes of e-mail
C. Tracing e-mail to the destination address
D. Triggering high levels of security alerts
The purpose of Windows Server Update Services (WSUS) is to:
A. manage the deployment of patches to company servers
B. provide alerts and reports on system vulnerabilities
C. set permissions to the minimum level necessary for each function
D. update licensing for Windows servers
You want to standardize security throughout your network. You primarily use Microsoft operating systems for servers and workstations. What is the best way to have standardized security (i.e. same password policies, lockout policies, etc.) throughout the network on clients and servers?
A. Publish the desired policies to all employees directing them to implement according to policy.
B. Configure each computer to adhere to the standard policies.
C. When installing new workstations or servers, image a machine that has proper security settings and install the new machine with that image.
D. Utilize Windows Security Templates for all computers.
Which of the following is the reason of properly securing an audit log?
A. To ensure that only authorized person can check the log file.
B. To ensure that no one can remove it as there is no back up is provided for this log.
C. To ensure that potential hackers becomes unable to delete the event logs for covering their tracks.
D. To ensure that potential hackers can be tracked easily without changing the network configuration.
Viewing Page 1 of 3 pages. Download PDF or Software version with 277 questions