Exam 98-367: Microsoft Security Fundamentals
Exam 98-367: Microsoft Security Fundamentals tests your knowledge of physical security, Internet security, operating system security, network security, and software security. This exam validates that a candidate has fundamental security knowledge and skills. It can serve as a stepping stone to the Microsoft Certified Solutions Associate (MCSA) exams. The MTA is a new, entry-level certification designed to help individuals take the first step toward a career as an IT professional or developer. Also, when you earn an MTA Certification, you become a member of the Microsoft Certified Professional community.
Target Audience
- The Exam 98-367: Microsoft Security Fundamentals is aimed at IT Professional who wish to work with Windows Server, Active Directory, anti-malware products, network topologies and devices, and network ports, etc.
- Anyone with an interest in security
- Students preparing for the MTA exam
Learning Objectives
The candidates should know the objectives for the Microsoft Technology Associate (MTA) Security Fundamentals Exam (98-367) in order to prepare. The exam guide on the Microsoft official website includes weightings, test domains, and objectives only. The objectives of the Exam 98-367: Microsoft Security Fundamentals are:
- Understand security layers (25-30%)
- Understand operating system security (35-40%)
- Understand network security (20-25%)
- Understand security software (15-20%)
Learning Path
Microsoft Security Fundamentals is designed for the people who want to earn the MTA: Security Fundamentals certification. MTA certifications are a great place to start if you would like to get into the technology field. MTA certifications address a wide spectrum of fundamental technical concepts, assess and validate core technical knowledge, and enhance technical credibility. The concerned job role is an administrator.
Exam Details
The Microsoft Security Fundamentals will come with code 98-367. The Exam MS-500: Microsoft 365 Security Administration contains 30-40 questions. However, the Microsoft 98-367 exam questions are of multiple-choice types. The candidate will be given 50 minutes to complete the exam. Also, the exam is available in several languages such as English, Chinese (Simplified), Chinese (Traditional), French, German, Italian, Japanese, Korean, Portuguese (Brazil), Russian, Spanish, Spanish (Mexico). The passing score is 700 (on a scale of 1-1000). The examination cost is $127 USD. There is no retirement date for the Microsoft certification.
Scheduling the Exam
The Microsoft exam can be registered and scheduled at the Pearson VUE and Certiport.
Exam 98-367: Microsoft Security Fundamentals Course Outline
Microsoft has divided the syllabus into various sections. Exam 98-367 includes its objectives and sub-topics in it. The Microsoft MTA 98-367 exam objectives includes:
Understand security layers (25-30%)
Understand core security principles
- Confidentiality
- Integrity
- Availability
- How threat and risk impact principles
- The principle of least privilege (Microsoft Documentation: Implementing Least-Privilege Administrative Models)
- Social engineering (Microsoft Documentation: Phishing)
- Attack surface analysis (Microsoft Documentation: Attack Surface Analyzer 2.0)
- Threat modeling (Microsoft Documentation: Threat Modeling Security Fundamentals)
Understand physical security
- Site security
- Computer security
- Removable devices and drives (Microsoft Documentation: control USB devices and other removable media)
- Access control (Microsoft Documentation: Access Control Overview)
- Mobile device security (Microsoft Documentation: Mobile device management)
- Keyloggers
Understand Internet security
- Browser security settings (Microsoft Documentation: Security and privacy, Web content filtering)
- Secure websites (Microsoft Documentation: Web protection)
Understand wireless security
- Advantages and disadvantages of specific security types (Microsoft Documentation: Security Principals, Wireless Access Deployment)
- Keys (Microsoft Documentation: Enable passwordless security key sign-in)
- Service set identifiers (SSIDs) (Microsoft Documentation: WiFi CSP, Wireless Access Deployment)
- MAC filters
Understand operating system security (35-40%)
Understand user authentication
- Multifactor authentication (Microsoft Documentation: Secure user sign-in events with Azure Multi-Factor Authentication)
- Physical and virtual smart cards (Microsoft Documentation: Virtual Smart Card Overview)
- Remote Authentication DialIn User Service (RADIUS) (Microsoft Documentation: RADIUS Authentication, Authorization, and Accounting)
- Biometrics (Microsoft Documentation: Fingerprint biometrics)
- Use Run As to perform administrative tasks (Microsoft Documentation: User permissions and Visual Studio)
Understand permissions
- File system permissions (Microsoft Documentation: File access permissions)
- Share permissions (Microsoft Documentation: Share and NTFS Permissions)
- Registry
- Active Directory (Microsoft Documentation: Active Directory Domain Services)
- Enable or disable inheritance (Microsoft Documentation: Using inherited permissions with Access-based Enumeration, About permissions and groups)
- Behavior when moving or copying files within the same disk or on another disk (Microsoft Documentation: How permissions are handled when you copy and move files and folders)
- Multiple groups with different permissions
- Basic permissions and advanced permissions (Microsoft Documentation: Use basic permissions to access the portal)
- Take ownership (Microsoft Documentation: Take ownership of files or other objects)
- Delegation
- Inheritance
Understand password policies
- Password complexity (Microsoft Documentation: Password must meet complexity requirements)
- Account lockout (Microsoft Documentation: Account Lockout Policy)
- Password length (Microsoft Documentation: Minimum password length)
- Password history (Microsoft Documentation: Enforce password history)
- The time between password changes (Microsoft Documentation: Minimum password age)
- Enforce by using Group Policies (Microsoft Documentation: Group Policy Overview)
- Common attack methods
- Password reset procedures
- Protect domain user account passwords (Microsoft Documentation: Enforce on-premises Azure AD Password Protection for Active Directory Domain Services)
Understand audit policies
- Types of auditing (Microsoft Documentation: Audit Policy Recommendations)
- What can be audited
- Enable auditing (Microsoft Documentation: Apply a basic audit policy on a file or folder)
- What to audit for specific purposes (Microsoft Documentation: Export, configure, and view audit log records)
- Where to save audit information (Microsoft Documentation: Search the audit log in the Security & Compliance Center)
- How to secure audit information
Exam 98-367: Microsoft Security Fundamentals Interview Questions
Understand encryption
- Encrypting file system (EFS) (Microsoft Documentation: Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate)
- How EFS-encrypted folders impact moving/copying files
- BitLocker (To Go) (Microsoft Documentation: BitLocker)
- TPM (Microsoft Documentation: Trusted Platform Module)
- Software-based encryption
- MAIL encryption and signing and other uses (Microsoft Documentation: Send and receive S/MIME signed and encrypted email in Exchange Online)
- Virtual private network (VPN) (Microsoft Documentation: Virtual Private Networking (VPN))
- Public key/private key (Microsoft Documentation: Public Key Infrastructure, Generating Keys for Encryption and Decryption)
- Encryption algorithms
- Certificate properties (Microsoft Documentation: Certificate Properties)
- Certificate services (Microsoft Documentation: Certificate Services)
- PKI/certificate services infrastructure
- Token devices (Microsoft Documentation: Primary Refresh Token)
- Lock down devices to run only trusted applications
Understand malware
- Buffer overflow (Microsoft Documentation: Buffer Overflow)
- Viruses, polymorphic viruses
- Worms (Microsoft Documentation: Worms)
- Trojan horses (Microsoft Documentation: Trojans)
- Spyware
- Ransomware (Microsoft Documentation: Ransomware)
- Adware
- Rootkits (Microsoft Documentation: Rootkits)
- Backdoors (Microsoft Documentation: Fileless threats)
- Zero day attacks (Microsoft Documentation: Exploits and exploit kits)
Understand network security (20-25%)
Understand dedicated firewalls
- Types of hardware firewalls and their characteristics (Microsoft Documentation: Basic Firewall Policy Design)
- When to use a hardware firewall instead of a software firewall
- Stateful vs. stateless firewall inspection
- Security Compliance Manager (Microsoft Documentation: Microsoft Compliance Manager)
- Security baselines (Microsoft Documentation: Windows security baselines)
Understand network isolation
- Routing (Microsoft Documentation: Configure Direct Routing)
- Honeypot
- Perimeter networks (Microsoft Documentation: Perimeter networks)
- Network address translation (NAT) (Microsoft Documentation: Create a NAT Gateway using the Azure portal and test the NAT service)
- VPN (Microsoft Documentation: Virtual Private Networking (VPN))
- IPsec (Microsoft Documentation: Configure IPsec/IKE policy)
- Server and domain isolation (Microsoft Documentation: Domain Isolation Policy Design)
Understand protocol security
- Protocol spoofing
- IPsec (Microsoft Documentation: Configure IPsec/IKE policy)
- Tunnelling (Microsoft Documentation: Configure forced tunneling)
- DNSsec (Microsoft Documentation: Overview of DNSSEC)
- Network sniffing (Microsoft Documentation: Manage packet captures with Azure Network Watcher using the portal)
- Denial-of-service (DoS) attacks (Microsoft Documentation: Azure DDoS Protection Standard overview)
- Common attack methods
Understand security software (15-20%)
Understand client protection
- Antivirus (Microsoft Documentation: Evaluate Microsoft Defender Antivirus, Next-generation protection in Windows 10)
- Protect against unwanted software installations (Microsoft Documentation: Unwanted software)
- User Account Control (UAC) (Microsoft Documentation: User Account Control working)
- Keep client operating system and software updated (Microsoft Documentation: keep your Windows computer up to date)
- Encrypt offline folders
- Software restriction policies (Microsoft Documentation: Software Restriction Policies)
- Principle of least privilege (Microsoft Documentation: Implementing Least-Privilege Administrative Models)
Understand email protection
- Antispam, antivirus, spoofing, phishing, and pharming (Microsoft Documentation: Anti-spoofing protection in EOP)
- Client vs. server protection (Microsoft Documentation: Onboard Windows servers to the Microsoft Defender ATP service)
- Sender Policy Framework (SPF) records (Microsoft Documentation: Set up SPF to help prevent spoofing)
- PTR records
Understand server protection
- Separation of services
- Hardening (Microsoft Documentation: Windows security baselines)
- Keep servers updated (Microsoft Documentation: Windows Server Update Services best practices)
- Secure dynamic Domain Name System (DNS) updates (Microsoft Documentation: How to configure DNS dynamic updates)
- Disable unsecure authentication protocols (Microsoft Documentation: Disable Basic authentication)
- Read-Only Domain Controllers (RODC) (Microsoft Documentation: Read-Only DCs and the Active Directory Schema)
Exam Policies
While preparing for the Microsoft exam, the candidate should visit the Microsoft official site and refer to the Microsoft exam policies and try to understand them. The Microsoft policies provide information regarding basic information such as policies about retaking the exam, scheduling the exam, candidate appeal process, etc.
Exam 98-367: Microsoft Security Fundamentals FAQ
Microsoft MTA Security Fundamentals Exam 98-367 Study Guide
Here is a step-by-step preparation guide for successfully passing the Exam 98-367: Microsoft Security Fundamentals.
STEP 1: Microsoft Learning Platform
Microsoft offers various learning paths, the candidate should visit the official website of Microsoft. For this exam, the candidate will find many learning paths and documentations. Finding the relatable content on the Microsoft website is quite an easy task.
STEP 2: Microsoft Documentation
Documentations are an important learning resource while preparing for Exam 98-367: Microsoft Security Fundamentals. The candidate will find documentation on every topic relating to the particular exam. This step is very valuable in preparing for the exam.
STEP 3: Instructor-Led Training
The training programs that Microsoft provides itself are available on their website. The Microsoft MTA Security Fundamentals exam 98-367 instructor-led training is an essential resource in order to prepare for the exam like 98-367. The candidate can find the instructor-led training on the page of the particular exam on the Microsoft website. There are various training courses available prior to one exam. The following is the training program offered by Microsoft.
- Module 1: Understanding Local Area Networking
- Module 2: Defining Networks with the OSI Model
- Module 3: Understanding Wired and Wireless Networks
- Module 4: Understanding Internet Protocol
- Module 5: Implementing TCP/IP in the Command Line
- Module 6: Working with Networking Services
- Module 7: Understanding Wide Area Networks
- Module 8: Defining Network Infrastructures and Network Security
- Module 9: Understanding Security Layers
- Module 10: Authentication, Authorization, and Accounting
- Module 11: Understanding Security Policies
- Module 12: Understanding Network Security
- Module 13: Protecting the Server and Client
Course 40367-B: Security Fundamentals: MTA Exam 98-367
- Module 1: Understanding Security Layers
- Module 2: Understanding Authentication, Authorization, and Accounting
- Module 3: Understanding Security Policies
- Module 4: Understanding Network Security
- Module 5: Protecting the Server and Client
Step 4: Books and Guides
The candidate should read some books and guides and prepare for Exam 98-367. Here, we are suggesting some Microsoft 98-367 study guides and books:
- Exam 98-367 Security Fundamentals 1st Edition by Microsoft Official Academic Course
- Microsoft Windows Security Essentials 1st Edition by Darril Gibson
- Exam 98-367 MTA Security Fundamentals, 2nd Edition by Microsoft Official Academic Course
- MTA 98-367: Security Fundamentals uCertify Course and Labs 1st Edition by uCertify
STEP 5: Join a Study Group
For passing the exam like Exam 98-367: Microsoft Security Fundamentals, the candidate needs to get and share knowledge. So, we are suggesting you to join some study group where you can discuss the concepts with the people who have the same goal. This will lead the candidate throughout their preparation.
STEP 6: Practice Test
The most important step is to try your hands on the practice test. Security Fundamentals MTA Exam 98-367 practice tests are the one which ensures the candidate about their preparation. There are many practice tests are available on the internet nowadays, the candidate can choose whichever they want. The practice test is very beneficial in preparing for the exam like Exam 98-367: Microsoft Security Fundamentals.