Eleventh Hour Security+: Exam SY0-201 Study GuideEleventh Hour Network+: Exam N10-004 Study Guide offers a practical guide for those preparing for the Security+ certification exam. The book's 14 chapters provide in-depth discussions of the following topics: systems security; operating system hardening; application security; virtualization technologies; network security; wireless networks; network access; network authentication; risk assessment and risk mitigation; general cryptographic concepts; public key infrastructure; redundancy planning; environmental controls and implementing disaster recovery and incident response procedures; and legislation and organizational policies. Each chapter includes information on exam objectives, exam warnings, and the top five toughest questions along with their answers.
|
Contents
1 | |
17 | |
CHAPTER 3 Application Security | 31 |
CHAPTER 4 Virtualization Technologies | 49 |
CHAPTER 5 Network Security | 61 |
CHAPTER 6 Wireless Networks | 77 |
CHAPTER 7 Network Access | 89 |
CHAPTER 8 Network Authentication | 109 |
Other editions - View all
Common terms and phrases
access control subject ACLs Active Active Directory ActiveX administrator adware algorithm allows application attack audit authentication Bluetooth browser cards certificate client components configuration connection cookies correct answer created cryptography database decrypt detect devices disk documentation domain downloaded e-mail encryption ensure equipment EXAM OBJECTIVES EXAM WARNING Fast Facts files firewall full backup function Group Policy hacker hardware hash hypervisor identify implement incident incorrect installed Internet IP address IPSec Kerberos key escrow layer LDAP malicious method Microsoft operating system organization packet password patches PEAP perform physical prevent private key programs protect protocol public key RAID require risk Role-based access control Security exam server signature Smart Cards specific Spyware storage stored TACACS threats tion traffic types updates user’s virtual machines viruses VLAN vulnerabilities Windows wireless networks workstation