CompTIA Security+ Review Guide: SY0-201This review guide is broken into six parts, each one corresponding to one of the six domain areas of the Security+ exam: systems security, network infrastructure, access control, assessments and audits, cryptography, and organizational security. You’ll find this book to be essential reading if you are studying for Security+ certification and want to get up to speed on the most recent security topics. The CD-ROM contains more than 120 review questions, two bonus exams, electronic flashcards, and a searchable key term database. |
From inside the book
Results 1-5 of 46
Page
... vulnerabilities and mitigations associated with various transmission media. 2.7 Explainthe vulnerabilities and implement mitigations associated with wireless networking. Review Questions Answers to Review Questions. Chapter. 3: Access.
... vulnerabilities and mitigations associated with various transmission media. 2.7 Explainthe vulnerabilities and implement mitigations associated with wireless networking. Review Questions Answers to Review Questions. Chapter. 3: Access.
Page
... vulnerability assessments using common tools. 4.3Within the realmofvulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning. 4.4 Use monitoring tools on systemsand networks anddetect ...
... vulnerability assessments using common tools. 4.3Within the realmofvulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning. 4.4 Use monitoring tools on systemsand networks anddetect ...
Page
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Page
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Page
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Common terms and phrases
access control accounts activity administrator allow applications attack auditing authentication authorized basic cable called certificate changes Chapter client communication complete configuration connection cryptography designed detection devices discussed distributed documentation domain drive email encryption environment escrow Exam Essentials example Explain Figure filters firewall function hash host identity implementation important incident Internet issues known logging malicious means mechanism method monitoring needed numerous object occurs ofthe operating system organization original packet password perform physical port port scanner possible prevent primary privilege procedures protection Protocol public key receives recovery remote require response restrictions Review risk Security+ server session single solution specific standard storage subnet symmetric traffic trust various vulnerability weak wireless