Wednesday, December 25, 2019

Latest microsoft 98-367 practice test, New Updated Microsoft 98-367 Exam exam dumps | 100 Free

Expert recommendation Pass4itsure braindumps of microsoft security fundamentals 98-367 with real questions : https://www.pass4itsure.com/98-367.html New Updated Microsoft 98-367 Exam Questions from Pass4itsure 98-367 PDF dumps!

Welcome to download the newest
Pass4itsure 98-367 PDF dumps:

https://drive.google.com/open?id=1rDEfb35al1XD5AqRdKT5KY-EkFZWKEW

Pass4itsure offers the latest Microsoft 98-367 practice test free of charge (6 Q&As)

QUESTION 1
Which of the following states that a user should never be given more privileges than are required to carry out a task?
A. Security through obscurity
B. Segregation of duties
C. Principle of least privilege
D. Role-based security
Correct Answer: C
The principle of least privilege states that a user should never be given more privileges than are required to carry out a
task. The user should not be logged on as an administrator, if the user is not doing administrative work on a computer.
The administrator account should be used for performing tasks, such as changing system time, installing software, or
creating standard accounts. Answer: D is incorrect. Role-based security provided by the .NET Framework allows,
grants, or
denies access to resources based on a Windows user\\’s identity. It is built on the principle that the user is authenticated
and can be authorized or assigned roles and permissions.
Answer: B is incorrect. Segregation of duties is used to determine whether decision-making, executive tasks, or control
tasks are carried out by a person to avoid unauthorized or unintended changes or the misuse of the organization\\’s
assets.
Whether the person needs access to information can also be determined. The risk of information being intentionally or
unintentionally used, altered, or destroyed is increased by unnecessary access. It is called the \\’need to know\\’
principle.
Answer: A is incorrect. Security through obscurity is a principle in security engineering, which attempts to use secrecy
(of design, implementation, etc.) to provide security. A system relying on security through obscurity may have theoretical
or
actual security vulnerabilities, but its owners or designers believe that the flaws are not known, and that attackers are
unlikely to find them.

QUESTION 2
You would implement a wireless intrusion prevention system to:
A. Prevent wireless interference
B. Detect wireless packet theft
C. Prevent rogue wireless access points
D. Enforce SSID broadcasting
Correct Answer: C

QUESTION 3
Which two security settings can be controlled by using group policy? (Choose two.)
A. Password complexity
B. Access to the Run… command
C. Automatic file locking
D. Encrypted access from a smart phone
Correct Answer: AB

QUESTION 4
Which enables access to all of the logged-in user\\’s capabilities on a computer?
A. Java applets
B. ActiveX controls
C. Active Server Pages (ASP)
D. Microsoft Silverlight
Correct Answer: B

QUESTION 5
What are three examples of factors required for multi-factor authentication? (Choose three.)
A. a username
B. a smart card
C. a fingerprint
D. a password challenge question
E. a pin number
Correct Answer: ACE

QUESTION 6
John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server
2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a
problem. Which of the following steps should John take as a countermeasure to this situation? Each correct answer
represents a complete solution. Choose all that apply.
A. He should restore his Windows settings.
B. He should upgrade his antivirus program.
C. He should observe the process viewer (Task Manager) to see whether any new process is running on the computer
or not. If any new malicious process is running, he should kill that process.
D. He should download the latest patches for Windows Server 2003 from the Microsoft site, so that he can repair the
kernel.
Correct Answer: BC
Answer: B and C
In such a situation, when John receives an error message revealing that Kernel32.exe is encountering a problem, he
needs to come to the conclusion that his antivirus program needs to be updated, because Kernel32.exe is not a
Microsoft
file (It is a Kernel32.DLL file.).
Although such viruses normally run on stealth mode, he should examine the process viewer (Task Manager) to see
whether any new process is running on the computer or not. If any new process (malicious) is running on the server, he
should exterminate that process.
Answer: A and D are incorrect. Since kernel.exe is not a real kernel file of Windows, there is no need to repair or
download any patch for Windows Server 2003 from the Microsoft site to repair the kernel.
Note: Such error messages can be received if the computer is infected with malware, such as Worm_Badtrans.b,
Backdoor.G_Door, Glacier Backdoor, Win32.Badtrans.29020, etc.

Pass4itsure Promo Code 15% Off


[youtu.be] Microsoft 98-367 practice


Shares actual and effective free exam content, Microsoft 98-367 is recommended by pass4itsure experts,
updated throughout the year, downloading the latest complete pass4itsure Microsoft 98-367 Exam Dumps Please select:https://www.pass4itsure.com/98-367.html!

No comments:

Post a Comment