
The BIOS and CMOS are often times thought to be the same thing, but they are not.
The BIOS and CMOS are often times thought to be the same thing, but they are not.
Southbridge The southbridge is an IC on the motherboard responsible for the hard drivecontroller, I/O controller and integrated hardware. Integrated hardware can include the sound card and video card if on the motherboard, USB, PCI, ISA, IDE, BIOS, andEthernet.
Short for super input/output or Super I/O, SIO is anintegrated circuit on a computer motherboard that handles the slower and less prominent input/output devices shown below.
Less commonly referred to as the Centronics interface or Centronics connectorafter the company that originally designed it, the port was later developed by Epson.
Originally known as the Analog-to-Digital port (A-to-D port), the as a game port, joystick port, or game control adapter is a 15-pin connector port first found onIBM computers in 1981.
What Is Memory, or RAM? System memory, frequently called main memory or RAM (Random Access Memory), is a type of computer memory that can be accessed randomly.
Source mc mcse Certification Resources DoS (Denial of Service) – A DoS attack is a common type of attack in which false requests to a server overload it to the point that it is unable to handle valid requests, cause it to reset, or shut it down completely.
Source mc mcse Certification Resources Physical Security – physical security is just as it sounds, locks on the doors, cameras everywhere, and so forth.
User authentication is the verification of an active human-to-machine transfer of credentials required for confirmation of a user’s authenticity; the term contrasts with machine authentication, which involves automated processes that do not require user input. Source mc mcse Certification Resources PKI (Public Key Infrastructure) – A public key infrastructure (PKI) is the combination of software,… Read more »
Source mc mcse Certification Resources ACL (Access Control List) – An ACL is a table in an operating system or network device (such as a router) that denies or allows access to resources.
Source mc mcse Certification Resources Cable Testers – Cable testers are electronic devices used to test a cable’s integrity by checking for opens and shorts which can cause connectivity problems.
Source mc mcse Certification Resources Application Layer vs. Network Layer – An application layer firewall works at the application layer of a protocol stack.
Source mc mcse Certification Resources Crosstalk Symptoms: Slow network performance and/or an excess of dropped or unintelligible packets. In telephony applications, users hear pieces of voice or conversations from a separate line.
Source mc mcse Certification Resources Gather Information on the Problem In a contact center network, problems are typically discovered and reported by one of the following types of users:
Source mc mcse Certification Resources Bandwidth – is the average number of bits that can be transmitted from the source to a destination over the network in one second.
Source mc mcse Certification Resources Quality of Service – (QoS) is a set of parameters that controls the level of quality provided to different types of network traffic.
The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to their underlying internal structure and technology.
Multilayer Switch – A multilayer switch (MLS) is a computer networking device that switches on OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI layers.
Hub – A physical layer network device used to connect multiple Ethernet devices together.
Vertical Cross Connect – is a location within a building where cables originate and / or are terminated, reconnected using jumpers or pass throughs or are connected to patch panels or other similar devices where the locations are from upper or lower floors in the building.
[bs_icon name=”glyphicon glyphicon-chevron-right”] Peer to Peer – A peer to peer network is one in which lacks a dedicated server and every computer acts as both a client and a server.
Ethernet – Ethernet is the most widely-installed local area network ( LAN) technology.
[bs_icon name=”glyphicon glyphicon-chevron-right”] Frame Relay – Frame relay is a secure, private network that utilizes a logical path or “virtual circuit” to allocate bandwidth for high performance transmissions.
568A and 568B – The number 568 refers to the order in which the individual wires inside a CAT 5 cable are terminated.
Cable Types :
Wireless networks allow computers to comunicate without the use of cables using IEEE 802.11 standards, also known as Wi-Fi.
[bs_icon name=”glyphicon glyphicon-chevron-right”] Introduction To Network
[bs_icon name=”glyphicon glyphicon-chevron-right”] The Purpose and Properties of Routing
Common IPv4 and IPv6 Routing Protocols
Proper Use of Addressing Technologies
Identify the Following Address Formats
Traceroute – A command-line troubleshooting tool that enables you to view the route to a specified host. This will show how many hops the packets have to travel and how long it takes. In Windows operating systems, the command used is “tracert”.
Common Networking Protocols
Here are the steps for troubleshooting a network
The Types of Wireless Attacks Part 2 CompTIA Security+ Objective 1.2 WPS Attacks Wi-Fi Protected Setup (WPS) allows users to configure a wireless network without typing in the passphrase. Instead, users can configure devices by pressing buttons or by entering a short personal identification number (PIN). For example, a user can configure a new wireless… Read more »
The Types of Wireless Attacks Part 1 CompTIA Security+ Objective 1.2 Replay Attacks A replay attack occurs when an attacker copies a stream of messages between two parties and replays the stream to one or more of the parties. Unless mitigated, the computers subject to the attack process the stream as legitimate messages, resulting in a range… Read more »
CompTIA and Immersive Labs are challenging cybersecurity professionals in the United States and United Kingdom to test their penetration testing skills this month. The two organizations launched the pen test challenge on the opening day of RSA® Conference 2019. “Penetration testing, if done right, is a proven and valuable activity that all organizations should engage… Read more »
The nature of cyberattacks is constantly in flux, always evolving to keep pace with the times. Hacking of websites, theft of credit card information and other personal information has become an almost daily occurrence, along with illegal remittances via Internet banking. Recent years have witnessed the accelerating dissemination of new technologies such as IoT… Read more »
“Richard Clarke, a former counter-terrorism expert for the United Government, once said, “If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked”. While the latter is a tad harsh (we wouldn’t wish a cyber attack on anyone!), the former is certainly true.” If you… Read more »
1. Your manager asks you to implement a system that can filter out unwanted content, such as viruses and unproductive Internet content. The best way to accomplish this would be through a system that implements a:
In this cram guide, we would like to give you some short tips on what to study for the Security+ exam to ensure a great score.
One of the most essential portions of information security is the design and topology of secure networks. What exactly do we mean by “topology?” Usually, a geographic diagram of a network comes to mind.
Some of the Security+ exam will test you on your knowledge of some basic email, Internet, and application security issues. Although the amount of detail of knowledge that is required is quite minimal, you must still have a working knowledge of some simple email and application security concepts.
Physical Security Physical security refers to the aspects of information security that are related to physical threats, such as fire or natural disasters. We will cover some basic physical security threats below:
Public Key Cryptography is a widely-applied form of cryptography commonly utilized in many network transactions.
In here we will learn about different symmetric key algorithms and their key features. More importantly, we will learn about some more key concepts related to cryptography as it applies to both symmetric and asymmetric algorithms.
Networking Overview In subsequent chapters of this study guide, we will take a look at different security topologies or ways that networks can be set up with security in mind.
[bs_icon name=”glyphicon glyphicon-chevron-right”] What is a Firewall? A firewall is any hardware or software designed to prevent unwanted network traffic. Some firewalls are simplistic in nature;
[bs_icon name=”glyphicon glyphicon-chevron-right”] Introduction to Cryptography
Viruses, Trojan Horses, Worms Despite all the hype about viruses and worms, the Security+ exam actually does not heavily test on viruses and the like.