Exam 98-367: Microsoft Security Fundamentals Interview Questions

  1. Home
  2. Exam 98-367: Microsoft Security Fundamentals Interview Questions
Exam 98-367: Microsoft Security Fundamentals Interview Questions

The MTA is a modern, entry-level credential created to help people who want to take the first step toward a profession as an IT specialist or developer. Also, when a person earns an MTA Certification, they become a member of the MTA: Security Fundamentals. So, in order to get a job as an MTA: Security Fundamentals professional, one has to clear the interview! So, here we are going to help you for clearing the interview successfully!

1. Tell us about the core security principles.

Ans. The core security principles are:

Confidentiality– it is the character of a resource securing way is restricted to only approved users, utilization, or systems. Confidentiality adjustments with satisfying information, networks, and systems guarantee unlawful access. There are various technologies that preserve confidentiality in an enterprise security implementation. These screens:

  • Strong encryption
  • Good Authentication
  • Stringent access controls

Integrity– is defined as the flexibility, energy, and efficacy of information or knowledge. It dispenses with the growing information security business is to assure that data is secured against any illegal or accidental changes.

Availability is the 3rd center security practice, and it outlines a resource being open to a user, object, or system when required. It suggests that when a user needs to get to data, he or she could perform so.

2. What are risk impacts?

Ans. Risk is usually recognized as the possibility that an accident will happen. The unusual type of risk is accepted as a threat, which is defined as an action or occurrence that could happen in the breach, or misrepresentation of a system by exploiting known or unknown vulnerabilities.

3. How risk management is employed to decrease the threat?

Ans. Risk management is the midpoint of knowing, assessing, and prioritizing alerts and risks.

Risk assessments are done to acknowledge the risks that influence the environment. A risk matrix must include the components such as:

  • The risk
  • The probability that the risk will happen
  • The influence of the risk
  • A total risk accounts
  • The important business owner (person, team, or business) for the risk
  • The focus security principles pretended by the risk—confidentiality, honesty, and/or availability
  • The suitable strategy or policies to trade with the risk
4. What are accepted acknowledgments to the risks?

Ans. The accepted acknowledgments to the risks are:

  • Risk avoidance
  • Risk acceptance
  • Risk mitigation
  • Risk transfer
5. Describe the purpose of the operating system in the security.

Ans. It has user authentication arrangements that guarantee the legitimacy of the user access. OS gives antivirus security against hateful attacks and has an inbuilt firewall that serves as a filter to control the kind of business entering into the system.

6. What is arrangement of least privilege?

Ans. The system of least privilege is a security regulation that demands that a precise user, system, or application be provided no more privilege than inevitable to fulfill its purpose or job.

The system of least privilege has been a staple in the security area for several years, and many businesses have attempted to achieve it completely. Nevertheless, with today’s heightened focus on security from both a business and a managerial way, businesses are operating harder than ever earlier to formulate their patterns around this policy.

7. What are surface attacks?

Ans. An attack surface includes the set of systems and roads an attacker can practice to access a system and possibly cause damage. The more extensive the attack surface of a special environment, the more numerous the risk of a successful attack.

8. How to interpret the surface attacks ?

Ans. To measure the attack surface of an atmosphere, it’s usually most comfortable to distribute the evaluation into 3 parts:

  • Application
  • Employee
  • Network

When assessing the application attack outside, one requires to look at stuff like:

  • The value of the code in an application
  • The quantity of data information to an application
  • The number of working services
  • Which ports the application is receiving on
9. Define Physical Security.

Ans. Physical security is the security of employees, hardware, software, systems, and data from real actions and issues that could cause serious damage or injury to an enterprise, business, or institution. This combines stability from fire, flood, natural calamities, robbery, theft, destruction, and terrorism.

10. Why the physical security is needed?

Ans. It is required because if someone can acquire a physical way to a server where secret data is collected, with the proper tools and full time, that person can circumvent any security the server practices to defend the data.

11. Explain the layered site security model.

Ans. This multilayered strategy to physical security is acknowledged as a defense-in-depth or a layered security strategy. Ensuring a physical site is more than just placing a hook on the front door and making certain that you practice that lock. Rather, it is a difficult hurdle for any security expert.

12. What do you think about access control?

Ans. Access control is a fundamental concept when reminiscing about physical protection. Defense in depth indicates using various layers of security to safeguard the assets. That way, even if an attacker breaches 1 layer of the defense, we have extra layers to keep that person out of the important areas of the environment.

12. Mention the factors of access control.

Ans. The factors are:

  • Authentication: Site security should address the requirement to identify and confirm the people who are allowed access to an area.
  • Access control: Once a person’s identification has been verified and authenticated, site security must discover what fields that person has passage to.
  • Auditing: Site security must accommodate the capacity to audit projects within the convenience. This can be achieved by reviewing the camera footage, visitor registration logs, badge reader logs, or other tools
13. What is Internal security?

Ans. Internal security, which places security stratagems at the regional level within the corresponding network to preserve the systems against a local criminal and even abreast the actions, intentional or unintentional, of the users.

14. Define External security.

Ans. External security blends opposing elements to all the computer operations of the organization to preserve them from outside threats, coming from the Internet.

15. What dou you think is Perimeter security?

Ans. Perimeter security is characterized as electronic components and materials for the physical security of the systems.

16. Name some kinds of internet security threats.

Ans. Some kinds of internet security threats are:

  • Malware
  • Spam
  • Phishing
  • Computer worm
  • Botnet
Q17. What are keyloggers and why are they used?

Ans. Keyloggers are activity-observing software applications that provide hackers access to personal data. The phrases and credit card numbers we type, the webpages we visit – all by logging in the keyboard strokes. The software is established on the computer and registers everything we type. Then it transmits this log file to a server, where cybercriminals are ready to make use of all this psychic information.

The best precaution against a software keylogger is the application of up-to-date antimalware software. Many software keyloggers are classified as malware by this utilization. We can also leverage the User Account Control and host-based firewalls to check a software keylogger from being introduced.

18. Name some types of Wireless Security.

Ans. Wireless securities are:

  • Wired Equivalent Privacy (WEP): WEP practices a data encryption system that is based on a mixture of user- and system-generated key benefits.
  • Wi-Fi Protected Access (WPA): It allows features like the Temporal Key Integrity Protocol which was a powerful 128-bit key that was more obstinate to develop into than WEP’s static, unchanging core.
  • Wi-Fi Protected Access 2 (WPA 2): WPA2 produced important changes and more innovations to the wireless security gambit. It reinstated TKIP with the Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP) which is a far superior encryption mechanism.
  • Wi-Fi Protected Access 3 (WPA 3): It is organizing the first major renovations to wireless agreement in 14 years. Some important additions for the security rules are: Greater security for passwords, Individualized encryption for private and open networks More security for enterprise networks.
19. Explain an SSID, or Service Set Identifier.

Ans. SSID persists for “Service Set Identifier”. Under the IEEE 802.11 wireless networking standard, a “service set” points to a number of wireless networking projects with the same parameters. So, the SSID is the identifier (name) that tells us which assistance set (or network) to connect.

SSIDs are created to be an individual name to discriminate among various Wi-Fi networks in the area so we can correlate to the conventional one.

20. What does MAC filter do?

Ans. MAC approach filtering provides us to prevent traffic coming from reliable known instruments or devices. The router practices the MAC address of a machine or device on the network to recognize it and block or authorize the access.

To facilitate MAC address filtering:

  • 1.       Pick Firewall > Advanced Settings > MAC Filtering.
  • 2.       Check the Enable box to turn on the MAC Address Filtering for this device. Uncheck the box to disable this feature.
21. Name some hardware firewalls.

Ans. A few brief explain are:

  • Circuit-Level Gateways.
  • Packet-Filtering Firewalls.
  • Stateful Inspection Firewalls.
  • Software Firewalls.
  • Cloud Firewalls.
  • Proxy Firewalls.
  • Next-Generation Firewalls.
  • Hardware Firewalls.
22. Do you think the principle of least privilege PoLP is important?

Ans. The principle of least privilege restricts the range of malware on the network. An executive or superuser with entrance to a lot of different network resources and support could possibly spread malware to all other systems.

23. Define stateless inspection.

Ans. A stateless inspection doesn’t hunt individual connections/sessions but offers a “go / no go” resolution on packet-by-packet support. It’s better for preventing some kinds of DDoS strikes (i.e. TCP-state exhaustion) and preventing reputational-based IoCs in size.

24. How are baselines utilized for security?

Ans. Security baselines are pre-configured combinations of the Windows frameworks that help one to implement the security settings that are maintained by the proper security teams. One can customize the baselines they extend to complete only those settings and decisions they require.

25. Tell us the distinction between spoofing and pharming.

Ans. Spoofing represents a criminal who represents another person or organization, with the intention to collect personal or business data. Pharming is a wicked website that matches a legitimate site, used to accumulate usernames and passwords.

26. Describe the main purposes of the firewall.

Ans. A firewall is a network security equipment that controls incoming and outgoing web traffic and determines whether to support or block specific traffic based on a determined set of security rules. Firewalls have been the first line of maintenance in network security for over 25 years.

27. Name some different kinds of spoofing?

Ans. General types of spoofing attacks involve:

  • Email Spoofing.
  • IP Spoofing.
  • Caller ID Spoofing.
  • Website Spoofing.
  • GPS spoofing.
  • Address Resolution Protocol Spoofing.
  • Man-in-the-middle attack, etc.
28. What is the main objective of a Sender Policy Framework record?

Ans. The main purpose of the Sender Policy Framework is to assist in protecting the domain against spoofing and help to stop the outgoing messages from being identified as spam. SPF stipulates the mail servers that are permitted to send an email for the domain.

29. Do you have any sort of certification to increase your possibilities?

Ans: Normally, interviewers see contestants who are considering changing their career possibilities by giving the use of further mechanisms like certifications. Credentials are convincing evidence that the claimant has put in all efforts to get abilities, understand them, and put them into exercise at the most notable of their ability.

30. Do you have any experience operating in an identical industry like ours?

Ans: Here comes a sharp question. It tries to assess if the applicant has the industry-specific skills that are needed for the simultaneous role. Even if you do not accept all of the abilities and experience, make sure to thoroughly explain how you can however make utilization of the talents and experience you’ve achieved in the past to help the company.

We hope that this article will help you to prepare and ace the interview. Microsoft certified are usually in high demand, so go and grab your spot! All the best!

Menu