CompTIA Security+ Review Guide: Exam SY0-401
Format: PDF / Kindle (mobi) / ePub
Focused review for the CompTIA Security+ certification exam
The CompTIA Security+ certification offers tremendous opportunities for IT professionals. For those who want to take their careers to the next level, CompTIA Security+ Review Guide: Exam SY0-401 is here to serve as a great resource for certification preparation. This concise, focused guide is easy to use and is organized by each exam objective for quick review and reinforcement of key topics. You'll find information on network security, compliance and operational security, and threats and vulnerabilities. Additionally, this indispensable resource delves into application, data, and host security, access control and identity management, and cryptography. Whether you're looking to achieve Security+ certification or simply get up to speed on key IT security concepts, this review guide brings together lessons on the most essential topics.
In addition to the content in the book, you'll have access to more than 100 practice exam questions, electronic flashcards, and a searchable glossary of key terms.
- Serves as an essential review guide for Security+ certification exam
- Split into six sections that cover the most essential topics for professionals interested in Security+ certification and other certifications
- Features additional resources featured on companion website, including practice exam questions, electronic flashcards, and a glossary of key terms
More than 250,000 IT professionals have earned their Security+ certification since it was founded. Join the thousands who are excelling in their IT careers and get a head start on reviewing for one of the field's most sought after certifications.
reduce overloading, and eliminate bottlenecks. Understand proxy A proxy server is a variation of an application-level firewall or circuit-level firewall. A proxy server is used as a proxy or middleman between clients and servers. Understand IDS An intrusion detection system (IDS) is an automated system that either watches activity in real time or reviews the contents of audit logs in order to detect intrusions or security policy violations. The two types of IDS are network-based and
that allow/deny decisions are made based on user activity, which is based on a predefined authorization matrix. NAC can also be deployed with aspects of both of these philosophies. Other issues related to NAC include using a client/system agent versus overall network monitoring (agentless); out-of-band versus in-band monitoring; and resolving any remediation, quarantine, or captive portal strategies. Many organizations have released products with the NAC concept in mind (often in the title of
exchange Links a mail- and messaging-related FQDN to an IP address NS Name server record Designates the FQDN and IP address of an authorized name server SOA Start of authority record Specifies authoritative information about the zone file, such as primary name server, serial number, timeouts, and refresh intervals Originally, DNS was handled by a static local file known as the HOSTS file. This file still exists, but a dynamic DNS query system has mostly replaced it, especially for large private
activities are occurring and are not detected, the victim is unaware of the situation. They are actively being harmed while not being aware that the harm is occurring. Thus, they do not know that they need to make any response or adjustment. This is the realm of the unknown unknown. In order to reduce the risk of false negatives, organizations should adopt a deny-by-default or implicit-deny security stance. This stance centers on the idea that nothing is allowed to occur, such as execution,
reply packets (ping packets). Understand spoofing. Spoofing is the act of falsifying data. Usually the falsification involves changing the source addresses of network packets. Because the source address is changed, victims are unable to locate the true attackers or initiators of a communication. Also, by spoofing the source address, attackers redirect responses, replies, and echoes of packets to some other system. Understand spam. Spam is any type of email that is undesired and/or