1. Your manager asks you to implement a system that can filter out unwanted content, such as viruses and unproductive Internet content. The best way to accomplish this would be through a system that implements a:
Posts Categorized: CompTIA Security+
In this cram guide, we would like to give you some short tips on what to study for the Security+ exam to ensure a great score.
Your company wishes to implement a web server, email server, and voice-over-IP server that are accessible to the rest of the Internet. However, it wants to ensure that the structure and hosts within the rest of the network are totally protected from outside access. Which of the following setups would provide this functionality?
Why would behavior-based IDS require less maintenance than knowledge-based IDS?
Which of the following topologies features a demilitarized zone or DMZ?
One of the most essential portions of information security is the design and topology of secure networks. What exactly do we mean by “topology?” Usually, a geographic diagram of a network comes to mind.
Which of the following is least likely to be associated with browser security?
You notice that many users are complaining that their emails are being rejected by the servers that they send the emails to.
Which of the following is not a program or tool used to ensure email security?
Some of the Security+ exam will test you on your knowledge of some basic email, Internet, and application security issues. Although the amount of detail of knowledge that is required is quite minimal, you must still have a working knowledge of some simple email and application security concepts.
Which of the following should be included in a BCP (business continuity plan)?
Which of the following conditions would have little effect on the ability for systems to continue functioning?
Which of the following fires can be put out easily with water?
Physical Security Physical security refers to the aspects of information security that are related to physical threats, such as fire or natural disasters. We will cover some basic physical security threats below:
Why is a hash more difficult to decipher than a standard encryption protocol?
Which of the following is not an asymmetric protocol?
Which of the following ensures message confidentiality, but not authenticity?
Public Key Cryptography is a widely-applied form of cryptography commonly utilized in many network transactions.
In here we will learn about different symmetric key algorithms and their key features. More importantly, we will learn about some more key concepts related to cryptography as it applies to both symmetric and asymmetric algorithms.
Networking Overview In subsequent chapters of this study guide, we will take a look at different security topologies or ways that networks can be set up with security in mind.
What is a Firewall? A firewall is any hardware or software designed to prevent unwanted network traffic. Some firewalls are simplistic in nature;
Introduction to Cryptography
Viruses, Trojan Horses, Worms Despite all the hype about viruses and worms, the Security+ exam actually does not heavily test on viruses and the like.
One of the most ever-present and ancient uses of the Internet and networking has been to provide remote access to networks or network resources.
A key aspect to any war is to know your enemy. If you consider the battle against malicious users a war, then understanding the attacks that they use is crucial.
Incident response Concept and procedures
SNMP: It (SNMP) is a mainstream convention for system administration. It is utilized for gathering data from, and designing, system gadgets, for example, servers, printers, centers, switches, and switches on an Internet Protocol (IP) system.
Tunneling, VPN, and IPSec