Share via


Exam 98-367 - Security Fundamentals

Overview


Language(s): English
Audience(s): Academic
Technology: Windows Server 2008
Type: Proctored Exam

Audience Profile

This exam is designed to provide candidates with an assessment of their knowledge of fundamental security concepts. It can also serve as a stepping stone to the Microsoft Certified Technology Specialist exams.

Candidates for this exam are seeking to prove fundamental security knowledge and skills. Before taking this exam, candidates should have a solid foundational knowledge of the topics outlined in this preparation guide. It is recommended that candidates become familiar with the concepts and the technologies described here by taking relevant training courses. Candidates are expected to have some hands-on experience with Windows Server, Windows based networking, Active Directory, Anti-Malware products, firewalls, network topologies and devices, and network ports.

Note This preparation guide is subject to change at any time without prior notice and at the sole discretion of Microsoft. Microsoft exams might include adaptive testing technology and simulation items. Microsoft does not identify the format in which exams are presented. Please use this preparation guide to prepare for the exam, regardless of its format.

Skills Measured


Understanding Security Layers

  • Understand core security principles.

    This objective may include but is not limited to: confidentiality; integrity; availability; how threat and risk impact principles; principle of least privilege; social engineering; attack surface

  • Understand physical security.

    This objective may include but is not limited to: site security; computer security; removable devices and drives; access control; mobile device security; disable Log On Locally; keyloggers

  • Understand Internet security.

    This objective may include but is not limited to: browser settings; zones; secure Web sites

  • Understand wireless security.

    This objective may include but is not limited to: advantages and disadvantages of specific security types; keys; SSID; MAC filters

Understanding Operating System Security

  • Understand user authentication.

    This objective may include but is not limited to: multifactor; smart cards; RADIUS; Public Key Infrastucture (PKI); understand the certificate chain; biometrics; Kerberos and time skew; using Run As to perform administrative tasks; password reset procedures

  • Understand permissions.

    This objective may include but is not limited to: file; share; registry; Active Directory; NTFS vs. FAT; enabling or disabling inheritance; behavior when moving or copying files within the same disk or on another disk; multiple groups with different permissions; basic permissions and advanced permissions; take ownership; delegation

  • Understand password policies.

    This objective may include but is not limited to: password complexity; account lockout; password length; password history; time between password changes; enforce by using group policies; common attack methods

  • Understand audit policies.

    This objective may include but is not limited to: types of auditing; what can be audited; enabling auditing; what to audit for specific purposes; where to save audit information; how to secure audit information

  • Understand encryption.

    This objective may include but is not limited to: EFS; how EFS encrypted folders impact moving/copying files; BitLocker (To Go); TPM; software-based encryption; MAIL encryption and signing and other uses; VPN; public-key / private key; encryption algorithms; certificate properties; certificate services; PKI/certificate services infrastructure; token devices

  • Understand malware.

    This objective may include but is not limited to: buffer overflow; worms; Trojans; spyware;

Understanding Network Security

  • Understand dedicated firewalls.

    This objective may include but is not limited to: types of hardware firewalls and their characteristics; why to use a hardware firewall instead of a software firewall; SCMs and UTMs; stateful vs. stateless inspection

  • Understand Network Access Protection (NAP).

    This objective may include but is not limited to: purpose of NAP; requirements for NAP

  • Understand network isolation.

    This objective may include but is not limited to: VLANs; routing; honeypot; perimeter networks; NAT; VPN; Ipsec; Server and Domain Isolation.

  • Understand protocol security.

    This objective may include but is not limited to: protocol spoofing; IPSec; tunneling; DNSsec; network sniffing; common attack methods

Understanding Security Software

  • Understand client protection.

    This objective may include but is not limited to: antivirus; User Account Control (UAC); keeping client operating system and software updated;encrypting offline folders; software restriction policies

  • Understand e-mail protection.

    This objective may include but is not limited to: antispam; antivirus; spoofing, phishing, and pharming; client vs. server protection; SPF records; PTR records

  • Understand server protection.

    This objective may include but is not limited to: separation of services; hardening; ); keeping server updated; secure dynamic DNS updates; disabling unsecure authentication protocols; Read-Only Domain Controllers; separate management VLAN; Microsoft Baseline Security Analyzer (MBSA)

Community


If one of the posts in the following threads helps you answering your question, please vote them as helpful so other community members will find helpful information faster.