Exam 98-367 - Security Fundamentals
Overview
Language(s): | English |
Audience(s): | Academic |
Technology: | Windows Server 2008 |
Type: | Proctored Exam |
Audience Profile
This exam is designed to provide candidates with an assessment of their knowledge of fundamental security concepts. It can also serve as a stepping stone to the Microsoft Certified Technology Specialist exams.
Candidates for this exam are seeking to prove fundamental security knowledge and skills. Before taking this exam, candidates should have a solid foundational knowledge of the topics outlined in this preparation guide. It is recommended that candidates become familiar with the concepts and the technologies described here by taking relevant training courses. Candidates are expected to have some hands-on experience with Windows Server, Windows based networking, Active Directory, Anti-Malware products, firewalls, network topologies and devices, and network ports.
Note This preparation guide is subject to change at any time without prior notice and at the sole discretion of Microsoft. Microsoft exams might include adaptive testing technology and simulation items. Microsoft does not identify the format in which exams are presented. Please use this preparation guide to prepare for the exam, regardless of its format.
Skills Measured
Understanding Security Layers
Understand core security principles.
This objective may include but is not limited to: confidentiality; integrity; availability; how threat and risk impact principles; principle of least privilege; social engineering; attack surface
Understand physical security.
This objective may include but is not limited to: site security; computer security; removable devices and drives; access control; mobile device security; disable Log On Locally; keyloggers
Understand Internet security.
This objective may include but is not limited to: browser settings; zones; secure Web sites
Understand wireless security.
This objective may include but is not limited to: advantages and disadvantages of specific security types; keys; SSID; MAC filters
Understanding Operating System Security
Understand user authentication.
This objective may include but is not limited to: multifactor; smart cards; RADIUS; Public Key Infrastucture (PKI); understand the certificate chain; biometrics; Kerberos and time skew; using Run As to perform administrative tasks; password reset procedures
Understand permissions.
This objective may include but is not limited to: file; share; registry; Active Directory; NTFS vs. FAT; enabling or disabling inheritance; behavior when moving or copying files within the same disk or on another disk; multiple groups with different permissions; basic permissions and advanced permissions; take ownership; delegation
Understand password policies.
This objective may include but is not limited to: password complexity; account lockout; password length; password history; time between password changes; enforce by using group policies; common attack methods
Understand audit policies.
This objective may include but is not limited to: types of auditing; what can be audited; enabling auditing; what to audit for specific purposes; where to save audit information; how to secure audit information
Understand encryption.
This objective may include but is not limited to: EFS; how EFS encrypted folders impact moving/copying files; BitLocker (To Go); TPM; software-based encryption; MAIL encryption and signing and other uses; VPN; public-key / private key; encryption algorithms; certificate properties; certificate services; PKI/certificate services infrastructure; token devices
Understand malware.
This objective may include but is not limited to: buffer overflow; worms; Trojans; spyware;
Understanding Network Security
Understand dedicated firewalls.
This objective may include but is not limited to: types of hardware firewalls and their characteristics; why to use a hardware firewall instead of a software firewall; SCMs and UTMs; stateful vs. stateless inspection
Understand Network Access Protection (NAP).
This objective may include but is not limited to: purpose of NAP; requirements for NAP
Understand network isolation.
This objective may include but is not limited to: VLANs; routing; honeypot; perimeter networks; NAT; VPN; Ipsec; Server and Domain Isolation.
Understand protocol security.
This objective may include but is not limited to: protocol spoofing; IPSec; tunneling; DNSsec; network sniffing; common attack methods
Understanding Security Software
Understand client protection.
This objective may include but is not limited to: antivirus; User Account Control (UAC); keeping client operating system and software updated;encrypting offline folders; software restriction policies
Understand e-mail protection.
This objective may include but is not limited to: antispam; antivirus; spoofing, phishing, and pharming; client vs. server protection; SPF records; PTR records
Understand server protection.
This objective may include but is not limited to: separation of services; hardening; ); keeping server updated; secure dynamic DNS updates; disabling unsecure authentication protocols; Read-Only Domain Controllers; separate management VLAN; Microsoft Baseline Security Analyzer (MBSA)
Community
- Wiki: Training and Certification Portal (en-US)
- Forum: Training and Certification (en-US)
- Microsoft Learning community
Related Forum Posts
If one of the posts in the following threads helps you answering your question, please vote them as helpful so other community members will find helpful information faster.