{"id":9913,"date":"2020-07-02T07:03:04","date_gmt":"2020-07-02T07:03:04","guid":{"rendered":"https:\/\/www.testpreptraining.com\/tutorial\/?page_id=9913"},"modified":"2021-12-06T06:08:40","modified_gmt":"2021-12-06T06:08:40","slug":"exam-98-367-microsoft-security-fundamentals","status":"publish","type":"page","link":"https:\/\/www.testpreptraining.ai\/tutorial\/exam-98-367-microsoft-security-fundamentals\/","title":{"rendered":"Exam 98-367: Microsoft Security Fundamentals"},"content":{"rendered":"\n<p>&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.testpreptraining.ai\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"400\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/07\/Exam_-98-367.png\" alt=\"Exam 98-367: Microsoft Security Fundamentals\" class=\"wp-image-10273\"\/><\/a><\/figure><\/div>\n\n\n\n<p><a href=\"https:\/\/www.testpreptraining.ai\/microsoft-security-fundamentals-98-367-certification\" target=\"_blank\" rel=\"noreferrer noopener\">Exam 98-367: Microsoft Security Fundamentals<\/a> tests your knowledge of physical security, Internet security, operating system security, network security, and software security. This exam validates that a candidate has fundamental security knowledge and skills. It can serve as a stepping stone to the Microsoft Certified Solutions Associate (MCSA) exams. The MTA is a new, entry-level certification designed to help individuals take the first step toward a career as an IT professional or developer. Also, when you earn an MTA Certification, you become a member of the Microsoft Certified Professional community.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Target Audience<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>The Exam 98-367: Microsoft Security Fundamentals is aimed at IT Professional who wish to work with Windows Server, Active Directory, anti-malware products, network topologies and devices, and network ports, etc.&nbsp;<\/li><li>Anyone with an interest in security<\/li><li>Students preparing for the MTA exam<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Learning Objectives&nbsp;<\/strong><\/h4>\n\n\n\n<p>The candidates should know the objectives for the Microsoft Technology Associate (MTA) Security Fundamentals Exam (98-367) in order to prepare. The exam guide on the Microsoft official website includes weightings, test domains, and objectives only. The objectives of the Exam 98-367: Microsoft Security Fundamentals are:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Understand security layers (25-30%)<\/li><li>Understand operating system security (35-40%)<\/li><li>Understand network security (20-25%)<\/li><li>Understand security software (15-20%)<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Learning Path&nbsp;<\/strong><\/h3>\n\n\n\n<p>Microsoft Security Fundamentals is designed for the people who want to earn the MTA: Security Fundamentals certification. MTA certifications are a great place to start if you would like to get into the technology field. MTA certifications address a wide spectrum of fundamental technical concepts, assess and validate core technical knowledge, and enhance technical credibility. The concerned job role is an administrator.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/07\/security-job-role.png\" alt=\"\" class=\"wp-image-9986\" width=\"787\" height=\"231\"\/><\/figure><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Exam Details&nbsp;<\/strong><\/h4>\n\n\n\n<p>The Microsoft Security Fundamentals will come with code 98-367. The Exam MS-500: Microsoft 365 Security Administration contains 30-40 questions. However, the Microsoft 98-367 exam questions are of multiple-choice types. The candidate will be given 50 minutes to complete the exam. Also, the exam is available in several languages such as English, Chinese (Simplified), Chinese (Traditional), French, German, Italian, Japanese, Korean, Portuguese (Brazil), Russian, Spanish, Spanish (Mexico). The passing score is 700 (on a scale of 1-1000). The examination cost is $127 USD. There is no retirement date for the Microsoft certification.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/www.testpreptraining.ai\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/07\/Exam_-98-367-1.png\" alt=\"Exam 98-367: Course Outline \" class=\"wp-image-10275\" width=\"916\" height=\"488\"\/><\/a><\/figure><\/div>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Scheduling the Exam<\/strong> <\/h5>\n\n\n\n<p>The Microsoft exam can be registered and scheduled at the Pearson VUE and Certiport. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/07\/security-schedule.png\" alt=\"\" class=\"wp-image-9915\" width=\"375\" height=\"197\"\/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Exam 98-367: Microsoft Security Fundamentals Course Outline&nbsp;<\/strong><\/h3>\n\n\n\n<p>Microsoft has divided the syllabus into various sections. Exam 98-367 includes its objectives and sub-topics in it. The Microsoft MTA 98-367 exam objectives includes:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/07\/security-objectives.png\" alt=\"Exam 98-367: Course Outline\" class=\"wp-image-9985\" width=\"520\" height=\"248\"\/><\/figure><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Understand security layers (25-30%)<\/strong><\/h4>\n\n\n\n<p>Understand core security principles&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Confidentiality<\/li><li>Integrity <\/li><li>Availability <\/li><li>How threat and risk impact principles <\/li><li>The principle of least privilege (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/identity\/ad-ds\/plan\/security-best-practices\/implementing-least-privilege-administrative-models#:~:text=The%20principle%20states%20that%20all,the%20users%20of%20those%20computers.\" target=\"_blank\" rel=\"noreferrer noopener\">Implementing Least-Privilege Administrative Models<\/a>)<\/li><li>Social engineering (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/intelligence\/phishing\" target=\"_blank\" rel=\"noreferrer noopener\">Phishing<\/a>)<\/li><li>Attack surface analysis (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/05\/15\/announcing-new-attack-surface-analyzer-2-0\/\" target=\"_blank\" rel=\"noreferrer noopener\">Attack Surface Analyzer 2.0<\/a>)<\/li><li>Threat modeling (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/paths\/tm-threat-modeling-fundamentals\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Modeling Security Fundamentals<\/a>)<\/li><\/ul>\n\n\n\n<p>Understand physical security&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Site security <\/li><li>Computer security <\/li><li>Removable devices and drives (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/device-control\/control-usb-devices-using-intune\" target=\"_blank\" rel=\"noreferrer noopener\">control USB devices and other removable media<\/a>)<\/li><li>Access control (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/identity-protection\/access-control\/access-control\" target=\"_blank\" rel=\"noreferrer noopener\">Access Control Overview<\/a>)<\/li><li>Mobile device security (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/client-management\/mdm\/\" target=\"_blank\" rel=\"noreferrer noopener\">Mobile device management<\/a>)<\/li><li>Keyloggers<\/li><\/ul>\n\n\n\n<p>Understand Internet security&nbsp; <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Browser security settings (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-edge\/deploy\/group-policies\/security-privacy-management-gp\" target=\"_blank\" rel=\"noreferrer noopener\">Security and privacy<\/a>, <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/microsoft-defender-atp\/web-content-filtering\" target=\"_blank\" rel=\"noreferrer noopener\">Web content filtering<\/a>)<\/li><li>Secure websites (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/microsoft-defender-atp\/web-protection-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Web protection<\/a>)<\/li><\/ul>\n\n\n\n<p>Understand wireless security&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Advantages and disadvantages of specific security types (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/identity-protection\/access-control\/security-principals\" target=\"_blank\" rel=\"noreferrer noopener\">Security Principals<\/a>, <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/networking\/core-network-guide\/cncg\/wireless\/e-wireless-access-deployment\" target=\"_blank\" rel=\"noreferrer noopener\">Wireless Access Deployment<\/a>)<\/li><li>Keys (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/authentication\/howto-authentication-passwordless-security-key#:~:text=Security%20keys%20provide%20improved%20productivity,using%20a%20FIDO2%20security%20key.\" target=\"_blank\" rel=\"noreferrer noopener\">Enable passwordless security key sign-in<\/a>)<\/li><li>Service set identifiers (SSIDs) (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/client-management\/mdm\/wifi-csp\" target=\"_blank\" rel=\"noreferrer noopener\">WiFi CSP<\/a>, <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/networking\/core-network-guide\/cncg\/wireless\/e-wireless-access-deployment\" target=\"_blank\" rel=\"noreferrer noopener\">Wireless Access Deployment<\/a>)<\/li><li>MAC filters <\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Understand operating system security (35-40%)<\/strong><\/h4>\n\n\n\n<p>Understand user authentication&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Multifactor authentication (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/authentication\/tutorial-enable-azure-mfa\" target=\"_blank\" rel=\"noreferrer noopener\">Secure user sign-in events with Azure Multi-Factor Authentication<\/a>)<\/li><li>Physical and virtual smart cards (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/identity-protection\/virtual-smart-cards\/virtual-smart-card-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Virtual Smart Card Overview<\/a>)<\/li><li>Remote Authentication DialIn User Service (RADIUS) (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/nps\/ias-radius-authentication-and-accounting\" target=\"_blank\" rel=\"noreferrer noopener\">RADIUS Authentication, Authorization, and Accounting<\/a>)<\/li><li>Biometrics (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/uwp\/security\/fingerprint-biometrics\" target=\"_blank\" rel=\"noreferrer noopener\">Fingerprint biometrics<\/a>)<\/li><li>Use Run As to perform administrative tasks (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/visualstudio\/ide\/user-permissions-and-visual-studio?view=vs-2019\" target=\"_blank\" rel=\"noreferrer noopener\">User permissions and Visual Studio<\/a>)<\/li><\/ul>\n\n\n\n<p>Understand permissions<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>File system permissions (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/uwp\/files\/file-access-permissions\" target=\"_blank\" rel=\"noreferrer noopener\">File access permissions<\/a>)<\/li><li>Share permissions (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/iis\/web-hosting\/configuring-servers-in-the-windows-web-platform\/configuring-share-and-ntfs-permissions\" target=\"_blank\" rel=\"noreferrer noopener\">Share and NTFS Permissions<\/a>)<\/li><li>Registry <\/li><li>Active Directory (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/identity\/ad-ds\/active-directory-domain-services\" target=\"_blank\" rel=\"noreferrer noopener\">Active Directory Domain Services<\/a>)<\/li><li>Enable or disable inheritance (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/storage\/dfs-namespaces\/using-inherited-permissions-with-access-based-enumeration\" target=\"_blank\" rel=\"noreferrer noopener\">Using inherited permissions with Access-based Enumeration<\/a>, <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/devops\/organizations\/security\/about-permissions?view=azure-devops&amp;tabs=preview-page\" target=\"_blank\" rel=\"noreferrer noopener\">About permissions and groups<\/a>)<\/li><li>Behavior when moving or copying files within the same disk or on another disk (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/support.microsoft.com\/en-in\/help\/310316\/how-permissions-are-handled-when-you-copy-and-move-files-and-folders\" target=\"_blank\" rel=\"noreferrer noopener\">How permissions are handled when you copy and move files and folders<\/a>)<\/li><li>Multiple groups with different permissions <\/li><li>Basic permissions and advanced permissions (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/microsoft-defender-atp\/basic-permissions\" target=\"_blank\" rel=\"noreferrer noopener\">Use basic permissions to access the portal<\/a>)<\/li><li>Take ownership (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/security-policy-settings\/take-ownership-of-files-or-other-objects#:~:text=Ownership%20can%20be%20transferred%20in,An%20administrator%20can%20take%20ownership.\" target=\"_blank\" rel=\"noreferrer noopener\">Take ownership of files or other objects<\/a>)<\/li><li>Delegation <\/li><li>Inheritance<\/li><\/ul>\n\n\n\n<p>Understand password policies&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Password complexity (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/security-policy-settings\/password-must-meet-complexity-requirements#:~:text=For%20the%20latest%20best%20practices,possibilities%20for%20a%20single%20password.\" target=\"_blank\" rel=\"noreferrer noopener\">Password must meet complexity requirements<\/a>)<\/li><li>Account lockout (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/security-policy-settings\/account-lockout-policy\" target=\"_blank\" rel=\"noreferrer noopener\">Account Lockout Policy<\/a>)<\/li><li>Password length (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/security-policy-settings\/minimum-password-length\" target=\"_blank\" rel=\"noreferrer noopener\">Minimum password length<\/a>)<\/li><li>Password history (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/security-policy-settings\/enforce-password-history\" target=\"_blank\" rel=\"noreferrer noopener\">Enforce password history<\/a>)<\/li><li>The time between password changes (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/security-policy-settings\/minimum-password-age#:~:text=The%20Minimum%20password%20age%20policy,number%20of%20days%20to%200.\" target=\"_blank\" rel=\"noreferrer noopener\">Minimum password age<\/a>)<\/li><li>Enforce by using Group Policies (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/previous-versions\/windows\/it-pro\/windows-server-2012-r2-and-2012\/hh831791(v=ws.11)\" target=\"_blank\" rel=\"noreferrer noopener\">Group Policy Overview<\/a>)<\/li><li>Common attack methods<\/li><li>Password reset procedures <\/li><li>Protect domain user account passwords (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/authentication\/concept-password-ban-bad-on-premises\" target=\"_blank\" rel=\"noreferrer noopener\">Enforce on-premises Azure AD Password Protection for Active Directory Domain Services<\/a>)<\/li><\/ul>\n\n\n\n<p>Understand audit policies&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Types of auditing (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/identity\/ad-ds\/plan\/security-best-practices\/audit-policy-recommendations\" target=\"_blank\" rel=\"noreferrer noopener\">Audit Policy Recommendations<\/a>)<\/li><li>What can be audited<\/li><li>Enable auditing (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/auditing\/apply-a-basic-audit-policy-on-a-file-or-folder#:~:text=Select%20and%20hold%20(or%20right,tab%2C%20and%20then%20select%20Continue.\" target=\"_blank\" rel=\"noreferrer noopener\">Apply a basic audit policy on a file or folder<\/a>)<\/li><li>What to audit for specific purposes (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/export-view-audit-log-records?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">Export, configure, and view audit log records<\/a>)<\/li><li>Where to save audit information (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/search-the-audit-log-in-security-and-compliance?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">Search the audit log in the Security &amp; Compliance Center<\/a>)<\/li><li>How to secure audit information <\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/exam-98-367-microsoft-security-fundamentals-interview-questions\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"400\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2021\/11\/Exam-98-367-Microsoft-Security-Fundamentals-Interview-Questions-1.jpg\" alt=\"\" class=\"wp-image-49556\"\/><\/a><\/figure><\/div>\n\n\n\n<h5 class=\"has-text-align-center wp-block-heading\"><strong><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/exam-98-367-microsoft-security-fundamentals-interview-questions\/\" target=\"_blank\" rel=\"noreferrer noopener\">Exam 98-367: Microsoft Security Fundamentals Interview Questions<\/a><\/strong><\/h5>\n\n\n\n<p>Understand encryption&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Encrypting file system (EFS) (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/information-protection\/windows-information-protection\/create-and-verify-an-efs-dra-certificate\" target=\"_blank\" rel=\"noreferrer noopener\">Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate<\/a>)<\/li><li>How EFS-encrypted folders impact moving\/copying files<\/li><li>BitLocker (To Go) (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/information-protection\/bitlocker\/bitlocker-overview\" target=\"_blank\" rel=\"noreferrer noopener\">BitLocker<\/a>)<\/li><li>TPM (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/information-protection\/tpm\/trusted-platform-module-top-node\" target=\"_blank\" rel=\"noreferrer noopener\">Trusted Platform Module<\/a>)<\/li><li>Software-based encryption<\/li><li>MAIL encryption and signing and other uses (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/office-365-security\/send-and-receive-s-mime-signed-and-encrypted-email?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">Send and receive S\/MIME signed and encrypted email in Exchange Online<\/a>)<\/li><li>Virtual private network (VPN) (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/remote\/remote-access\/vpn\/vpn-top\" target=\"_blank\" rel=\"noreferrer noopener\">Virtual Private Networking (VPN)<\/a>)<\/li><li>Public key\/private key (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/seccertenroll\/public-key-infrastructure\" target=\"_blank\" rel=\"noreferrer noopener\">Public Key Infrastructure<\/a>, <a href=\"https:\/\/docs.microsoft.com\/en-us\/dotnet\/standard\/security\/generating-keys-for-encryption-and-decryption\" target=\"_blank\" rel=\"noreferrer noopener\">Generating Keys for Encryption and Decryption<\/a>)<\/li><li>Encryption algorithms <\/li><li>Certificate properties (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/seccrypto\/certificate-properties\" target=\"_blank\" rel=\"noreferrer noopener\">Certificate Properties<\/a>)<\/li><li>Certificate services (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/seccrypto\/certificate-services\" target=\"_blank\" rel=\"noreferrer noopener\">Certificate Services<\/a>)<\/li><li>PKI\/certificate services infrastructure<\/li><li>Token devices (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/devices\/concept-primary-refresh-token\" target=\"_blank\" rel=\"noreferrer noopener\">Primary Refresh Token<\/a>)<\/li><li>Lock down devices to run only trusted applications <\/li><\/ul>\n\n\n\n<p>Understand malware<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Buffer overflow (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/cpp\/text\/buffer-overflow?view=vs-2019\" target=\"_blank\" rel=\"noreferrer noopener\">Buffer Overflow<\/a>)<\/li><li>Viruses, polymorphic viruses <\/li><li>Worms (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/intelligence\/worms-malware#:~:text=Worms%20represent%20a%20large%20category,files%2C%20and%20other%20malicious%20activities.\" target=\"_blank\" rel=\"noreferrer noopener\">Worms<\/a>)<\/li><li>Trojan horses (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/intelligence\/trojans-malware\" target=\"_blank\" rel=\"noreferrer noopener\">Trojans<\/a>)<\/li><li>Spyware <\/li><li>Ransomware (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/intelligence\/ransomware-malware\" target=\"_blank\" rel=\"noreferrer noopener\">Ransomware<\/a>)<\/li><li>Adware<\/li><li>Rootkits (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/intelligence\/rootkits-malware\" target=\"_blank\" rel=\"noreferrer noopener\">Rootkits<\/a>)<\/li><li>Backdoors (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/intelligence\/fileless-threats\" target=\"_blank\" rel=\"noreferrer noopener\">Fileless threats<\/a>)<\/li><li>Zero day attacks (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/intelligence\/exploits-malware\" target=\"_blank\" rel=\"noreferrer noopener\">Exploits and exploit kits<\/a>)<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Understand network security (20-25%)<\/strong><\/h4>\n\n\n\n<p>Understand dedicated firewalls&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Types of hardware firewalls and their characteristics (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-firewall\/basic-firewall-policy-design\" target=\"_blank\" rel=\"noreferrer noopener\">Basic Firewall Policy Design<\/a>)<\/li><li>When to use a hardware firewall instead of a software firewall <\/li><li>Stateful vs. stateless firewall inspection <\/li><li>Security Compliance Manager (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/compliance-manager?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Compliance Manager<\/a>)<\/li><li>Security baselines (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-security-baselines#:~:text=You%20can%20use%20security%20baselines,values%20specified%20in%20the%20baseline.\" target=\"_blank\" rel=\"noreferrer noopener\">Windows security baselines<\/a>)<\/li><\/ul>\n\n\n\n<p>Understand network isolation&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Routing (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoftteams\/direct-routing-configure\" target=\"_blank\" rel=\"noreferrer noopener\">Configure Direct Routing<\/a>)<\/li><li>Honeypot<\/li><li>Perimeter networks (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/cloud-adoption-framework\/ready\/azure-best-practices\/perimeter-networks\" target=\"_blank\" rel=\"noreferrer noopener\">Perimeter networks<\/a>)<\/li><li>Network address translation (NAT) (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/virtual-network\/tutorial-create-validate-nat-gateway-portal\" target=\"_blank\" rel=\"noreferrer noopener\">Create a NAT Gateway using the Azure portal and test the NAT service<\/a>)<\/li><li>VPN (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/remote\/remote-access\/vpn\/vpn-top\" target=\"_blank\" rel=\"noreferrer noopener\">Virtual Private Networking (VPN)<\/a>)<\/li><li>IPsec (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/vpn-gateway\/vpn-gateway-ipsecikepolicy-rm-powershell\" target=\"_blank\" rel=\"noreferrer noopener\">Configure IPsec\/IKE policy<\/a>)<\/li><li>Server and domain isolation (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-firewall\/domain-isolation-policy-design#:~:text=In%20the%20domain%20isolation%20policy,Basic%20Firewall%20Policy%20Design%20section.\" target=\"_blank\" rel=\"noreferrer noopener\">Domain Isolation Policy Design<\/a>)<\/li><\/ul>\n\n\n\n<p>Understand protocol security<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Protocol spoofing <\/li><li>IPsec (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/vpn-gateway\/vpn-gateway-ipsecikepolicy-rm-powershell\" target=\"_blank\" rel=\"noreferrer noopener\">Configure IPsec\/IKE policy<\/a>)<\/li><li>Tunnelling (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/vpn-gateway\/vpn-gateway-forced-tunneling-rm\" target=\"_blank\" rel=\"noreferrer noopener\">Configure forced tunneling<\/a>)<\/li><li>DNSsec (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/previous-versions\/windows\/it-pro\/windows-server-2012-r2-and-2012\/jj200221(v=ws.11)\" target=\"_blank\" rel=\"noreferrer noopener\">Overview of DNSSEC<\/a>)<\/li><li>Network sniffing (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/network-watcher\/network-watcher-packet-capture-manage-portal\" target=\"_blank\" rel=\"noreferrer noopener\">Manage packet captures with Azure Network Watcher using the portal<\/a>)<\/li><li>Denial-of-service (DoS) attacks (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/virtual-network\/ddos-protection-overview#:~:text=Distributed%20denial%20of%20service%20(DDoS,application%20unavailable%20to%20legitimate%20users.\" target=\"_blank\" rel=\"noreferrer noopener\">Azure DDoS Protection Standard overview<\/a>)<\/li><li>Common attack methods <\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Understand security software (15-20%)<\/strong><\/h4>\n\n\n\n<p>Understand client protection&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Antivirus (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/microsoft-defender-antivirus\/evaluate-microsoft-defender-antivirus\" target=\"_blank\" rel=\"noreferrer noopener\">Evaluate Microsoft Defender Antivirus<\/a>, <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/microsoft-defender-antivirus\/microsoft-defender-antivirus-in-windows-10\" target=\"_blank\" rel=\"noreferrer noopener\">Next-generation protection in Windows 10<\/a>)<\/li><li>Protect against unwanted software installations (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/intelligence\/unwanted-software\" target=\"_blank\" rel=\"noreferrer noopener\">Unwanted software<\/a>)<\/li><li>User Account Control (UAC) (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/identity-protection\/user-account-control\/how-user-account-control-works\" target=\"_blank\" rel=\"noreferrer noopener\">User Account Control working<\/a>)<\/li><li>Keep client operating system and software updated (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/troubleshoot\/windows-client\/deployment\/keep-windows-up-to-date\" target=\"_blank\" rel=\"noreferrer noopener\">keep your Windows computer up to date<\/a>)<\/li><li>Encrypt offline folders<\/li><li>Software restriction policies (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/identity\/software-restriction-policies\/software-restriction-policies\" target=\"_blank\" rel=\"noreferrer noopener\">Software Restriction Policies<\/a>)<\/li><li>Principle of least privilege (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/identity\/ad-ds\/plan\/security-best-practices\/implementing-least-privilege-administrative-models#:~:text=The%20principle%20states%20that%20all,the%20users%20of%20those%20computers.\" target=\"_blank\" rel=\"noreferrer noopener\">Implementing Least-Privilege Administrative Models<\/a>)<\/li><\/ul>\n\n\n\n<p>Understand email protection<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Antispam, antivirus, spoofing, phishing, and pharming (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/office-365-security\/anti-spoofing-protection?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">Anti-spoofing protection in EOP<\/a>)<\/li><li>Client vs. server protection (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/microsoft-defender-atp\/configure-server-endpoints\" target=\"_blank\" rel=\"noreferrer noopener\">Onboard Windows servers to the Microsoft Defender ATP service<\/a>)<\/li><li>Sender Policy Framework (SPF) records (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/office-365-security\/set-up-spf-in-office-365-to-help-prevent-spoofing?view=o365-worldwide#:~:text=Using%20SPF%20helps%20to%20validate,send%20mail%20on%20your%20behalf.\" target=\"_blank\" rel=\"noreferrer noopener\">Set up SPF to help prevent spoofing<\/a>)<\/li><li>PTR records <\/li><\/ul>\n\n\n\n<p>Understand server protection&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Separation of services<\/li><li>Hardening (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-security-baselines\" target=\"_blank\" rel=\"noreferrer noopener\">Windows security baselines<\/a>)<\/li><li>Keep servers updated (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/troubleshoot\/mem\/configmgr\/windows-server-update-services-best-practices\" target=\"_blank\" rel=\"noreferrer noopener\">Windows Server Update Services best practices<\/a>)<\/li><li>Secure dynamic Domain Name System (DNS) updates (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/support.microsoft.com\/en-in\/help\/816592\/how-to-configure-dns-dynamic-updates-in-windows-server-2003\" target=\"_blank\" rel=\"noreferrer noopener\">How to configure DNS dynamic updates<\/a>)<\/li><li>Disable unsecure authentication protocols (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/exchange\/clients-and-mobile-in-exchange-online\/disable-basic-authentication-in-exchange-online#:~:text=Content%2DLength%3A%200-,Manage%20Basic%20authentication%20in%20the%20Microsoft%20365%20Admin%20Center,Basic%20Authentication%20to%20be%20enabled.\" target=\"_blank\" rel=\"noreferrer noopener\">Disable Basic authentication<\/a>)<\/li><li>Read-Only Domain Controllers (RODC) (<strong>Microsoft Documentation:<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/ad\/rodc-and-active-directory-schema\" target=\"_blank\" rel=\"noreferrer noopener\">Read-Only DCs and the Active Directory Schema<\/a>)<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Exam Policies&nbsp;<\/strong><\/h4>\n\n\n\n<p>While preparing for the Microsoft exam, the candidate should visit the Microsoft official site and refer to the <a href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/certifications\/certification-exam-policies\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft exam policies<\/a> and try to understand them. The Microsoft policies provide information regarding basic information such as policies about <a href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/certifications\/certification-exam-policies\" target=\"_blank\" rel=\"noreferrer noopener\">retaking the exam<\/a>, scheduling the exam, candidate appeal process, etc.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/exam-98-367-microsoft-security-fundamentals-faq\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/07\/Exam-98-367_-Microsoft-Security-Fundamentals.png\" alt=\"Exam 98-367: Microsoft Security Fundamentals FAQ\" class=\"wp-image-9984\" width=\"750\" height=\"400\"\/><\/a><\/figure><\/div>\n\n\n\n<h5 class=\"has-text-align-center wp-block-heading\"><strong><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/exam-98-367-microsoft-security-fundamentals-faq\/\" target=\"_blank\" rel=\"noreferrer noopener\">Exam 98-367: Microsoft Security Fundamentals FAQ<\/a><\/strong><\/h5>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Microsoft MTA Security Fundamentals Exam 98-367 Study Guide<\/strong><\/h3>\n\n\n\n<p>Here is a step-by-step preparation guide for successfully passing the Exam 98-367: Microsoft Security Fundamentals.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/www.testpreptraining.ai\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/07\/Exam-98-367-1-283x400.png\" alt=\"Exam 98-367: Preparatory Guide \" class=\"wp-image-10276\" width=\"507\" height=\"717\" srcset=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/07\/Exam-98-367-1-283x400.png 283w, https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/07\/Exam-98-367-1.png 1587w\" sizes=\"auto, (max-width: 507px) 100vw, 507px\" \/><\/a><\/figure><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>STEP 1: Microsoft Learning Platform<\/strong> <img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"100\" class=\"wp-image-10279\" style=\"width: 100px;\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/07\/download-2.png\" alt=\"\"><\/h4>\n\n\n\n<p>Microsoft offers various learning paths, the candidate should visit the official website of Microsoft. For this exam, the candidate will find many learning paths and documentations. Finding the relatable content on the Microsoft website is quite an easy task.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>STEP 2: Microsoft Documentation&nbsp;<\/strong><img decoding=\"async\" class=\"wp-image-10278\" style=\"width: 150px;\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/07\/kairos-documentation.jpg\" alt=\"\"><\/h4>\n\n\n\n<p>Documentations are an important learning resource while preparing for Exam 98-367: Microsoft Security Fundamentals. The candidate will find documentation on every topic relating to the particular exam. This step is very valuable in preparing for the exam.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>STEP 3: Instructor-Led Training<\/strong> <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"46\" class=\"wp-image-10280\" style=\"width: 150px;\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/07\/unnamed.jpg\" alt=\"\"><\/h4>\n\n\n\n<p>The training programs that Microsoft provides itself are available on their website. The Microsoft MTA Security Fundamentals exam 98-367 instructor-led training is an essential resource in order to prepare for the exam like 98-367. The candidate can find the instructor-led training on the page of the particular exam on the Microsoft website. There are various training courses available prior to one exam. The following is the training program offered by Microsoft.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/certifications\/courses\/40032\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Course 40032-A: Networking and Security Fundamentals: Training 2-Pack for MTA Exams 98-366 and 98-367<\/strong><\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Module 1: Understanding Local Area Networking<\/li><li>Module 2: Defining Networks with the OSI Model<\/li><li>Module 3: Understanding Wired and Wireless Networks<\/li><li>Module 4: Understanding Internet Protocol<\/li><li>Module 5: Implementing TCP\/IP in the Command Line<\/li><li>Module 6: Working with Networking Services<\/li><li>Module 7: Understanding Wide Area Networks<\/li><li>Module 8: Defining Network Infrastructures and Network Security<\/li><li>Module 9: Understanding Security Layers<\/li><li>Module 10: Authentication, Authorization, and Accounting<\/li><li>Module 11: Understanding Security Policies<\/li><li>Module 12: Understanding Network Security<\/li><li>Module 13: Protecting the Server and Client<\/li><\/ul>\n\n\n\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/certifications\/courses\/40367\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Course 40367-B: Security Fundamentals: MTA Exam 98-367<\/strong><\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Module 1: Understanding Security Layers<\/li><li>Module 2: Understanding Authentication, Authorization, and Accounting<\/li><li>Module 3: Understanding Security Policies<\/li><li>Module 4: Understanding Network Security<\/li><li>Module 5: Protecting the Server and Client<\/li><\/ul>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Step 4: Books and Guides<\/strong> <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"192\" class=\"wp-image-9995\" style=\"width: 150px;\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/07\/security-book.png\" alt=\"\"><\/h4>\n\n\n\n<p>The candidate should read some books and guides and prepare for Exam 98-367. Here, we are suggesting some Microsoft 98-367 study guides and books:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Exam 98-367 Security Fundamentals 1st Edition by Microsoft Official Academic Course<\/li><li>Microsoft Windows Security Essentials 1st Edition by Darril Gibson&nbsp;<\/li><li>Exam 98-367 MTA Security Fundamentals, 2nd Edition by Microsoft Official Academic Course<\/li><li>MTA 98-367: Security Fundamentals uCertify Course and Labs 1st Edition by uCertify<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>STEP 5: Join a Study Group&nbsp;<\/strong><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"87\" class=\"wp-image-10281\" style=\"width: 150px;\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/07\/how-to-make-the-most-out-of-mcat-study-group.jpg\" alt=\"\"><\/h4>\n\n\n\n<p>For passing the exam like Exam 98-367: Microsoft Security Fundamentals, the candidate needs to get and share knowledge. So, we are suggesting you to join some study group where you can discuss the concepts with the people who have the same goal. This will lead the candidate throughout their preparation.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>STEP 6: Practice Test<\/strong> <img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"26\" class=\"wp-image-10282\" style=\"width: 100px;\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo.png\" alt=\"\"><\/h4>\n\n\n\n<p>The most important step is to try your hands on the practice test. <a href=\"https:\/\/www.testpreptraining.ai\/security-fundamentals-98-367-practice-exam\">Security Fundamentals MTA Exam 98-367 practice tests<\/a> are the one which ensures the candidate about their preparation. There are many practice tests are available on the internet nowadays, the candidate can choose whichever they want. The practice test is very beneficial in preparing for the exam like Exam 98-367: Microsoft Security Fundamentals.<\/p>\n\n\n\n<h5 class=\"has-text-align-center wp-block-heading\"><strong><a href=\"https:\/\/www.testpreptraining.ai\/microsoft-security-fundamentals-98-367-free-practice-test\" target=\"_blank\" rel=\"noreferrer noopener\">Exam 98-367: Microsoft Security Fundamentals Free Practice Test <\/a><\/strong><\/h5>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Exam 98-367: Microsoft Security Fundamentals tests your knowledge of physical security, Internet security, operating system security, network security, and software security. This exam validates that a candidate has fundamental security knowledge and skills. It can serve as a stepping stone to the Microsoft Certified Solutions Associate (MCSA) exams. The MTA is a new, entry-level&#8230;<\/p>\n","protected":false},"author":1,"featured_media":10273,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"categories":[1226,5728],"tags":[1464,1467,1466,1465,4],"class_list":["post-9913","page","type-page","status-publish","has-post-thumbnail","hentry","category-microsoft","category-security","tag-exam-98-367-microsoft-security-fundamentals","tag-exam-98-367-microsoft-security-fundamentals-faq","tag-exam-98-367-microsoft-security-fundamentals-free-practice-test","tag-exam-98-367-microsoft-security-fundamentals-tutorial","tag-m4f"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Exam 98-367: Microsoft Security Fundamentals - Testprep Training Tutorials<\/title>\n<meta name=\"description\" content=\"Get ready to boost your learning and prepare for Exam 98-367: Microsoft Security Fundamentals. Practice and become Certified MTA Now!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.testpreptraining.ai\/tutorial\/exam-98-367-microsoft-security-fundamentals\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exam 98-367: Microsoft Security Fundamentals - Testprep Training Tutorials\" \/>\n<meta property=\"og:description\" content=\"Get ready to boost your learning and prepare for Exam 98-367: Microsoft Security Fundamentals. Practice and become Certified MTA Now!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.testpreptraining.ai\/tutorial\/exam-98-367-microsoft-security-fundamentals\/\" \/>\n<meta property=\"og:site_name\" content=\"Testprep Training Tutorials\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-06T06:08:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/07\/Exam_-98-367.png\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/exam-98-367-microsoft-security-fundamentals\/\",\"url\":\"https:\/\/www.testpreptraining.ai\/tutorial\/exam-98-367-microsoft-security-fundamentals\/\",\"name\":\"Exam 98-367: Microsoft Security Fundamentals - Testprep Training Tutorials\",\"isPartOf\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#website\"},\"datePublished\":\"2020-07-02T07:03:04+00:00\",\"dateModified\":\"2021-12-06T06:08:40+00:00\",\"description\":\"Get ready to boost your learning and prepare for Exam 98-367: Microsoft Security Fundamentals. Practice and become Certified MTA Now!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/exam-98-367-microsoft-security-fundamentals\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.testpreptraining.ai\/tutorial\/exam-98-367-microsoft-security-fundamentals\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/exam-98-367-microsoft-security-fundamentals\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.testpreptraining.ai\/tutorial\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exam 98-367: Microsoft Security Fundamentals\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#website\",\"url\":\"https:\/\/www.testpreptraining.ai\/tutorial\/\",\"name\":\"Testprep Training Tutorials\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.testpreptraining.ai\/tutorial\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#organization\",\"name\":\"Testprep Training\",\"url\":\"https:\/\/www.testpreptraining.ai\/tutorial\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png\",\"contentUrl\":\"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png\",\"width\":583,\"height\":153,\"caption\":\"Testprep Training\"},\"image\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Exam 98-367: Microsoft Security Fundamentals - Testprep Training Tutorials","description":"Get ready to boost your learning and prepare for Exam 98-367: Microsoft Security Fundamentals. Practice and become Certified MTA Now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.testpreptraining.ai\/tutorial\/exam-98-367-microsoft-security-fundamentals\/","og_locale":"en_US","og_type":"article","og_title":"Exam 98-367: Microsoft Security Fundamentals - Testprep Training Tutorials","og_description":"Get ready to boost your learning and prepare for Exam 98-367: Microsoft Security Fundamentals. Practice and become Certified MTA Now!","og_url":"https:\/\/www.testpreptraining.ai\/tutorial\/exam-98-367-microsoft-security-fundamentals\/","og_site_name":"Testprep Training Tutorials","article_modified_time":"2021-12-06T06:08:40+00:00","og_image":[{"width":750,"height":400,"url":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/07\/Exam_-98-367.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/exam-98-367-microsoft-security-fundamentals\/","url":"https:\/\/www.testpreptraining.ai\/tutorial\/exam-98-367-microsoft-security-fundamentals\/","name":"Exam 98-367: Microsoft Security Fundamentals - Testprep Training Tutorials","isPartOf":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#website"},"datePublished":"2020-07-02T07:03:04+00:00","dateModified":"2021-12-06T06:08:40+00:00","description":"Get ready to boost your learning and prepare for Exam 98-367: Microsoft Security Fundamentals. Practice and become Certified MTA Now!","breadcrumb":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/exam-98-367-microsoft-security-fundamentals\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.testpreptraining.ai\/tutorial\/exam-98-367-microsoft-security-fundamentals\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/exam-98-367-microsoft-security-fundamentals\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.testpreptraining.ai\/tutorial\/"},{"@type":"ListItem","position":2,"name":"Exam 98-367: Microsoft Security Fundamentals"}]},{"@type":"WebSite","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#website","url":"https:\/\/www.testpreptraining.ai\/tutorial\/","name":"Testprep Training Tutorials","description":"","publisher":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.testpreptraining.ai\/tutorial\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#organization","name":"Testprep Training","url":"https:\/\/www.testpreptraining.ai\/tutorial\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/","url":"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png","contentUrl":"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png","width":583,"height":153,"caption":"Testprep Training"},"image":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages\/9913","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/comments?post=9913"}],"version-history":[{"count":21,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages\/9913\/revisions"}],"predecessor-version":[{"id":49960,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages\/9913\/revisions\/49960"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/media\/10273"}],"wp:attachment":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/media?parent=9913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/categories?post=9913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/tags?post=9913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}