7print.bg = 1 принтиране + 2 плотиране + 3 подвързване + 4 чаши + 5 тениски + 6 книгоиздаване + 7 рекламни м-ли 088 682 47 47
CompTIA Security + Get Certified Get Ahead

CompTIA Security + Get Certified Get Ahead

Сумата се прибавя директно в кошницата

Table of Contents
Acknowledgments About the Author
Who This Book Is For About This Book How to Use This Book Conventions Remember This Vendor Neutral Free Online Resources Additional Web Resources Assumptions Set a Goal
About the Exam
Passing Score Exam Prerequisites Beta Questions Exam Format Question Types Multiple Choice Performance-Based Questions Question Complexity Video
Exam Test Provider Voucher Code for 10 Percent Off Exam Domains Objective to Chapter Map
1.0 Threats, Attacks and Vulnerabilities 21%
2.0 Technologies and Tools 22%
3.0 Architecture and Design 15%
4.0 Identity and Access Management 16%
5.0 Risk Management 14%
6.0 Cryptography and PKI 12%
Recertification Requirements Pre-Assessment Exam Assessment Exam Answers Chapter 1 Mastering Security Basics
Understanding Core Security Goals
What Is a Use Case?
Ensure Confidentiality Encryption Access Controls Steganography and Obfuscation Provide Integrity Hashing
Digital Signatures. Certificates, and Non-Repudiation Increase Availability Redundancy and Fault Tolerance Patching
Resource Versus Security Constraints
Introducing Basic Risk Concepts
Understanding Control Types
Technical Controls Administrative Controls Physical Controls Control Goals Preventive Controls Detective Controls
Comparing Detection and Prevention Controls Corrective Controls Deterrent Controls Compensating Controls Combining Control Types and Goals
Implementing Virtualization
Comparing Hypervisors
Application Cell or Container Virtualization

Secure Network Architecture Snapshots

VDI/VDE and Non-Persistence VMs as Files

Risks Associated with Virtualization Running Kali Linux in a VM

Using Command-Line Tools

Windows Command Line Linux Terminal

Understanding Switches and Getting Help

Understanding Case


Using Ping to Check Name Resolution Beware of Firewalls Using Ping to Check Security Posture Ipconfig, ifconfig, and ip Netstat Tracert Arp

Chapter 1 Exam Topic Review

Chapter 1 Practice Questions

Chapter 1 Practice Question Answers

Chapter 2 Understanding Identity and Access Management

Exploring Authentication Concepts

Comparing Identification and AAA Comparing Authentication Factors Something You Know Something You Have Something You Are Somewhere You Are

Dual-Factor and Multifactor Authentication Summarizing Identification Methods Troubleshooting Authentication Issues

Comparing Authentication Services



LDAP and LDAPS Single Sign-On

Managing Accounts

Least Privilege Need to Know Account Types

Require Administrators to Use Two Accounts Standard Naming Convention Prohibiting Shared and Generic Accounts Disablement Policies Recovering Accounts Time-of-Day Restrictions Expiring Accounts and Recertification Account Maintenance Credential Management

Comparing Access Control Models

Role-Based Access Control Using Roles Based on Jobs and Functions Documenting Roles with a Matrix Establishing Access with Group-Based Privileges Rule-Based Access Control Discretionary Access Control STDs and DACLs The Owner Establishes Access Beware of Trojans Mandatory Access Control Labels and Lattice Establishing Access Attribute-Based Access Control

Chapter 2 Exam Topic Review

Chapter 2 Practice Questions

Chapter 2 Practice Question Answers

Chapter 3 Exploring Network Technologies and Tools

Reviewing Basic Networking Concepts

Basic Networking Protocols Implementing Protocols for Use Cases