Exam Profile: MTA: Security Fundamentals (98-367)

Date: May 10, 2011

Return to the article

This article profiles Microsoft’s Security Fundamentals exam (98-367), which leads to the Microsoft Technology Associate (MTA) certification. Pearson IT Certification provides a variety of exam preparation tools to help our customers in their quest for certification. As part of our service to you, we have developed this Exam Profile series. Each profile is developed based on the testing experience of one of our trainers or authors. You won’t get exact questions or answers, but you will get a real feel for the exam. Each profile describes question forms, trouble spots, hints for exam preparation, and recommendations for additional study resources. Find out what you can expect to see on the exam and how you can better prepare for it.

Microsoft’s Security Fundamentals exam tests your knowledge of physical security, Internet security, operating system security, network security and software security. The Security Fundamentals exam is similar to the CompTIA Security+ exam. After you pass the Security Fundamentals exam, you will have earned your Microsoft Technology Associate (MTA) Certification.

Many people would like to pursue a career in technology, but lack the foundational knowledge necessary to pursue Technology Specialist or Professional certifications. The MTA certification creates a new entry point to help those who have little practical experience get into the career field, and can be the first step towards becoming a Microsoft Technology Specialist (MCTS).

The MTA is a new, entry-level certification designed to help individuals take the first step toward a career as an IT professional or developer. Also, when you earn an MTA Certification, you become a member of the Microsoft Certified Professional community. You will get access to members-only benefits such as special offers, the MCP transcript tool, and private newsgroups where you can network, find peer support, and share your accomplishments other certified professionals worldwide.

At this time, MTA is only available to students, faculty, and staff of an accredited academic institution that is an approved MTA testing center. MTA exams are only available at academic institutions that have purchased an MTA Campus License or MTA vouchers; they are delivered in an internet-based testing platform, and the institution’s educators serve as proctors.

The next step in the Microsoft certification path is Microsoft Technology Specialist (MCTS) which requires hands on experience with the Microsoft technology platform. Microsoft makes its complete developer toolset available for students to download and install at no cost through the DreamSpark Program.

Each MTA Certification exam covers a broad technology area, including:

In order to earn an MTA Certification, candidates only need to pass one exam. The MTA Certification will expire after five years.

Exam Details

Trouble Spots

Trouble Spots

As with any exam, it will vary from person to person what is deemed to be difficult. Some of the common trouble spots include NTFS and share permissions, password policy, VLANS, VPN, server updates, hardware vs. software firewall, threat and risk, social engineering. Each of these topics is outlined below.

NTFS and Share Permissions

There are two levels of security you must be familiar with: Share and NTFS. The Share permissions that let you protect your resources are Read, Change, Full Control, and No Access. NTFS permissions are List, No Access, Change, Add, and Read and Add. Share permissions can only apply to the subdirectory level, but NTFS permissions are applied to the file level and are in affect whether the user is logged on locally or across a network. When NTFS and shared folder permissions are combined, the most restrictive set of permissions takes precedence. When logging on locally, a user's level of access for a folder is determined by his least restrictive level of access. The least restrictive level would be the level of permission a user has for accessing an NTFS folder locally. When No Access permission is combined with any other permission, an access level of No Access is always the result. Only drives formatted as NTFS will have the Permissions tab.

Hidden Share

Hidden shares are created by using a $ at the end of the share name. They can only be accessed using the share name$. This is a good idea if you have special software that you want to limit access to, but do not feel that using NTFS permissions is the best way to accomplish this. If you have created a hidden share, you would access it by typing \\servername\hiddensharename$ from the Start/Run prompt. You can also right click on My Computer and Map a Drive to a hidden share.

Administrative Share

Administrative shares are shares created by the system on Windows Workstations and Servers and cannot be changed without a registry edit.

There is an administrative share on each drive letter. To access an administrative share, from the Start/Run command, type \\servername\drive letter$. Accessing a server via administrative shares allows you to delete, copy, or move files or folders and to create files or folders. You can also administer NTFS permission, but not share permissions. A good use of this is to open an administrative share in one window and create a folder. Then go to My Computer and copy files between the server and workstation. You can also right click on My Computer and Map a Drive to an administrative share.

Password Policy

Passwords have become much more complex since users started logging in. You must determine how you will setup the password requirements in your organization. You can set your password length, prevent users from changing their passwords, make a password never expire, require a password to have upper and lower case, require it to have a numeral, and require it to have special characters. You can control your password policy using a Group Policy.

Virtual Local Area Networks (VLANS)

A VLAN is a network that does not exist physically. It is a way of using your existing infrastructure to create two different networks over the same Local Area Network (LAN). By doing this, you keep traffic from one network separate from the other network. Most VLANs are created on a switch, which keeps track of the traffic and of the network on which it transverses by placing some type of a VLAN tag on the packets. A router is used to allow two different networks or VLANS to communicate.

Virtual Private Network (VPN)

A Virtual Private Network (VPN) is used to connect two private networks across the Internet. You must have a VPN server to authenticate users connecting via VPN. Some firewalls have VPN built in to them.

Server Updates

Keeping your servers up to date with the latest patches, hotfixes and service packs from Microsoft is vital. You can do this manually, but if you have many servers in an enterprise network, it would be too time consuming. Microsoft offers a solution in their Windows Server Update Service (WSUS). Loading WSUS on a server allows it to be a central point of contact for Microsoft updates. This server would receive the updates and then distribute them across your network to the other servers you have specified.

Hardware vs. Software Firewall

Every broadband internet connections should be protected with a firewall. A hardware firewall is an actual device that resided on your network such as a switch or router that you use to permit or deny traffic in or out of your network. Hardware firewalls are more robust, but cost more than software firewalls. A hardware firewall controls traffic at the packet and port level and are not concerned with applications. A software firewall is a piece of software that is usually installed on a PC that is used to permit or deny network traffic. Depending on the number of PCs you have, it can be a cumbersome to manage.

Threat and Risk

Managing threat and risk can be a delicate balancing act. You want to keep your network safe, but keep the expense low. Since the cost of eliminating all threats is virtually impossible, you have to decide the amount of risk you are willing to take. For instance, if you wanted to remove all threat of being in a car accident, you would never travel by car. You assume a certain amount of risk each time you travel, but you help to minimize the risk of accidents by trying to follow the rules of good driving. It is the same with networking: the only way to eliminate all threats would be to turn all devices on your network off. As a network administrator, you have to determine what measures you can afford to put in place and manage, which will protect your network.

Social Engineering

Social engineering is manipulating people instead of hacking networks to get information. Since people are usually the weakest link in a network environment, by manipulating someone into performing an action or divulging confidential information, you can easily get what you need to compromise a network. This type of corporate espionage is one of the oldest and most effect ways to infiltrate a company.

Preparation Hints

Preparation Hints

Review the Exam Objectives below and make sure that you are familiar with them. If you do have access to a Windows 2008 network, hands-on practice in that environment will help you to connect the theory with real life. Always check the Microsoft site for the specific exam you are going to take. In this instance, the site is http://www.microsoft.com/learning/en/us/exam.aspx?ID=98-367&locale=en-us. There are many web sites and blogs that can help you to research topics, but be careful to fully research the information you read. It is not advisable to try to find sites that list questions and answers for several reasons. First, you don’t know if you will be asked a specific question and second, the answers given in a blog may be inaccurate and third, you need to understand the information to adequately prepare.

When taking the exam, read each question carefully. Microsoft is notorious for adding a lot of unneeded information in their questions. Make sure that when you click on a choice, that it is really marked. Be careful clicking anywhere on the screen. I found that by inadvertently clicking near the scroll bar on the right of the screen, I actually changed an answer. You get a single piece of paper and a marker for writing. You can use a small amount of time before you even start the exam to make notes once you enter the test area. Sometimes there is even a questionnaire at the beginning of the test that does not count against your test time. You can even use this time to write down notes, facts, tables or other information by taking your time between answers.

Recommended Study Resources

Recommended Study Resources

98-367: MTA Security Fundamentals by Microsoft Official Academic Course

Exam Objectives

Exam Objectives

The exam objectives are broken up into four different categories.

Understanding Security Layers

Understanding Operating System Security

Understanding Network Security

Understanding Security Software

Where to Go from Here

Where to Go from Here

After you pass the Security Fundamentals exam, you are a certified MTA in the IT Professional category. Some other exams you may want to consider taking are:

All available MTA exams can be found at: http://www.microsoft.com/learning/en/us/certification/mta.aspx#certification

800 East 96th Street, Indianapolis, Indiana 46240

vceplus-200-125    | boson-200-125    | training-cissp    | actualtests-cissp    | techexams-cissp    | gratisexams-300-075    | pearsonitcertification-210-260    | examsboost-210-260    | examsforall-210-260    | dumps4free-210-260    | reddit-210-260    | cisexams-352-001    | itexamfox-352-001    | passguaranteed-352-001    | passeasily-352-001    | freeccnastudyguide-200-120    | gocertify-200-120    | passcerty-200-120    | certifyguide-70-980    | dumpscollection-70-980    | examcollection-70-534    | cbtnuggets-210-065    | examfiles-400-051    | passitdump-400-051    | pearsonitcertification-70-462    | anderseide-70-347    | thomas-70-533    | research-1V0-605    | topix-102-400    | certdepot-EX200    | pearsonit-640-916    | itproguru-70-533    | reddit-100-105    | channel9-70-346    | anderseide-70-346    | theiia-IIA-CIA-PART3    | certificationHP-hp0-s41    | pearsonitcertification-640-916    | anderMicrosoft-70-534    | cathMicrosoft-70-462    | examcollection-cca-500    | techexams-gcih    | mslearn-70-346    | measureup-70-486    | pass4sure-hp0-s41    | iiba-640-916    | itsecurity-sscp    | cbtnuggets-300-320    | blogged-70-486    | pass4sure-IIA-CIA-PART1    | cbtnuggets-100-101    | developerhandbook-70-486    | lpicisco-101    | mylearn-1V0-605    | tomsitpro-cism    | gnosis-101    | channel9Mic-70-534    | ipass-IIA-CIA-PART1    | forcerts-70-417    | tests-sy0-401    | ipasstheciaexam-IIA-CIA-PART3    | mostcisco-300-135    | buildazure-70-533    | cloudera-cca-500    | pdf4cert-2v0-621    | f5cisco-101    | gocertify-1z0-062    | quora-640-916    | micrcosoft-70-480    | brain2pass-70-417    | examcompass-sy0-401    | global-EX200    | iassc-ICGB    | vceplus-300-115    | quizlet-810-403    | cbtnuggets-70-697    | educationOracle-1Z0-434    | channel9-70-534    | officialcerts-400-051    | examsboost-IIA-CIA-PART1    | networktut-300-135    | teststarter-300-206    | pluralsight-70-486    | coding-70-486    | freeccna-100-101    | digitaltut-300-101    | iiba-CBAP    | virtuallymikebrown-640-916    | isaca-cism    | whizlabs-pmp    | techexams-70-980    | ciscopress-300-115    | techtarget-cism    | pearsonitcertification-300-070    | testking-2v0-621    | isacaNew-cism    | simplilearn-pmi-rmp    | simplilearn-pmp    | educationOracle-1z0-809    | education-1z0-809    | teachertube-1Z0-434    | villanovau-CBAP    | quora-300-206    | certifyguide-300-208    | cbtnuggets-100-105    | flydumps-70-417    | gratisexams-1V0-605    | ituonline-1z0-062    | techexams-cas-002    | simplilearn-70-534    | pluralsight-70-697    | theiia-IIA-CIA-PART1    | itexamtips-400-051    | pearsonitcertification-EX200    | pluralsight-70-480    | learn-hp0-s42    | giac-gpen    | mindhub-102-400    | coursesmsu-CBAP    | examsforall-2v0-621    | developerhandbook-70-487    | root-EX200    | coderanch-1z0-809    | getfreedumps-1z0-062    | comptia-cas-002    | quora-1z0-809    | boson-300-135    | killtest-2v0-621    | learncia-IIA-CIA-PART3    | computer-gcih    | universitycloudera-cca-500    | itexamrun-70-410    | certificationHPv2-hp0-s41    | certskills-100-105    | skipitnow-70-417    | gocertify-sy0-401    | prep4sure-70-417    | simplilearn-cisa    |
http://www.pmsas.pr.gov.br/wp-content/    | http://www.pmsas.pr.gov.br/wp-content/    |