Security Fundamentals

Code: 98-367
Price:

Exam 98-367 - Security Fundamentals

Skills measured

This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about thevariety of question typeson Microsoft exams.

Prerequisties:

Microsoft Training 40367 -Security Fundamentals

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Pleasesend Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit anexam challenge.

Understand security layers (25–30%)

  • Understand core security principles
    • Confidentiality; integrity; availability; how threat and risk impact principles; principle of least privilege; social engineering; attack surface
  • Understand physical security
    • Site security; computer security; removable devices and drives; access control; mobile device security; disable Log On Locally; keyloggers
  • Understand Internet security
    • Browser settings; zones; secure websites
  • Understand wireless security
    • Advantages and disadvantages of specific security types; keys; service set identifiers (SSIDs); MAC filters

Preparation resources

  • Windows Server 2008 in an organization's defense in depth strategy
  • Secure Windows Server
  • Using Windows Server 2008: Controlling communication with the Internet

Understand operating system security (30–35%)

  • Understand user authentication
    • Multifactor; smart cards; Remote Authentication Dial-In User Service (RADIUS); Public Key Infrastructure (PKI); understand the certificate chain; biometrics; Kerberos and time skew; use Run As to perform administrative tasks; password reset procedures
  • Understand permissions
    • File; share; registry; Active Directory; NT file system (NTFS) versus file allocation table (FAT); enable or disable inheritance; behavior when moving or copying files within the same disk or on another disk; multiple groups with different permissions; basic permissions and advanced permissions; take ownership; delegation
  • Understand password policies
    • Password complexity; account lockout; password length; password history; time between password changes; enforce by using Group Policies; common attack methods
  • Understand audit policies
    • Types of auditing; what can be audited; enable auditing; what to audit for specific purposes; where to save audit information; how to secure audit information
  • Understand encryption
    • Encrypting file system (EFS); how EFS-encrypted folders impact moving/copying files; BitLocker (To Go); TPM; software-based encryption; MAIL encryption and signing and other uses; virtual private network (VPN); public key/private key; encryption algorithms; certificate properties; certificate services; PKI/certificate services infrastructure; token devices
  • Understand malware
    • Buffer overflow; worms; Trojans; spyware

Preparation resources

  • Windows authentication
  • Password policy
  • Audit policies

Understand network security (20–25%)

  • Understand dedicated firewalls
    • Types of hardware firewalls and their characteristics; why to use a hardware firewall instead of a software firewall; SCMs and UTMs; stateful versus stateless inspection
  • Understand Network Access Protection (NAP)
    • Purpose of NAP; requirements for NAP
  • Understand network isolation
    • Virtual local area networks (VLANs); routing; honeypot; perimeter networks; network address translation (NAT); VPN; IPsec; server and domain isolation
  • Understand protocol security
    • Protocol spoofing; IPsec; tunneling; DNSsec; network sniffing; common attack methods

Preparation resources

  • Windows Firewall
  • Network Access Protection
  • IPsec

Understand security software (15–20%)

  • Understand client protection
    • Antivirus; User Account Control (UAC); keep client operating system and software updated; encrypt offline folders, software restriction policies
  • Understand email protection
    • Antispam, antivirus, spoofing, phishing, and pharming; client versus server protection; Sender Policy Framework (SPF) records; PTR records
  • Understand server protection
    • Separation of services; hardening; keep server updated; secure dynamic Domain Name System (DNS) updates; disable unsecure authentication protocols; Read-Only Domain Controllers (RODC); separate management VLAN; Microsoft Baseline Security Analyzer (MBSA)

Preparation resources

  • What's new for operating system hardening and integrity for Windows Server 2008
  • Software restriction policies
  • What's new for server protection in Windows Server 2008

Course Reviews

No reviews found for this course.

Be the first to write a review