Wonder Club world wonders pyramid logo
×

CompTIA Security+ SY0-301 Authorized Practice Questions Exam Cram Book

CompTIA Security+ SY0-301 Authorized Practice Questions Exam Cram
Be the First to Review this Item at Wonderclub
X
CompTIA Security+ SY0-301 Authorized Practice Questions Exam Cram, CompTIA Security+ SY0-301 Practice Questions Exam Cram, Third Edition, offers all the exam practice you'll need to systematically prepare, identify and fix areas of weakness, and pass your exam the first time. This book and CD complement any Securi, CompTIA Security+ SY0-301 Authorized Practice Questions Exam Cram
out of 5 stars based on 0 reviews
5
0 %
4
0 %
3
0 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • CompTIA Security+ SY0-301 Authorized Practice Questions Exam Cram
  • Written by author Diane Barrett
  • Published by Pearson IT Certification, 12/26/2011
  • CompTIA Security+ SY0-301 Practice Questions Exam Cram, Third Edition, offers all the exam practice you'll need to systematically prepare, identify and fix areas of weakness, and pass your exam the first time. This book and CD complement any Securi
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Introduction . 5

Who This Book Is For 5

What You Will Find in This Book 5

Hints for Using This Book 6

Need Further Study? . 7

Chapter One Domain 1.0: Network Security 9

Practice Questions 10

Objective 1.1: Explain the security function and purpose of network devices and technologies 10

Objective 1.2: Apply and implement secure network administration principles . 16

Objective 1.3: Distinguish and differentiate network design elements and compounds . 23

Objective 1.4: Implement and use common protocols 32

Objective 1.5: Identify commonly used ports . 36

Objective 1.6: Implement wireless network in a secure manner 40

Quick-Check Answer Key 44

Objective 1.1: Explain the security function and purpose of network devices and technologies 44

Objective 1.2: Apply and implement secure network administration principles . 44

Objective 1.3: Distinguish and differentiate network design elements and compounds . 45

Objective 1.4: Implement and use common protocols 45

Objective 1.5: Identify commonly used ports . 46

Objective 1.6: Implement wireless network in a secure manner 46

Answers and Explanations 47

Objective 1.1: Explain the security function and purpose of network devices and technologies 47

Objective 1.2: Apply and implement secure network administration principles . 52

Objective 1.3: Distinguish and differentiate network design elements and compounds 58

Objective 1.4: Implement and use common protocols 65

Objective 1.5: Identify commonly used ports . 70

Objective 1.6: Implement wireless network in a secure manner 71

Chapter Two Domain 2.0: Compliance and Operational Security . 75

Practice Questions 76

Objective 2.1: Explain risk related concepts. 76

Objective 2.2: Carry out appropriate risk mitigation strategies . 83

Objective 2.3: Execute appropriate incident response procedures . 85

Objective 2.4: Explain the importance of security related awareness and training . 87

Objective 2.5: Compare and contrast aspects of business continuity 92

Objective 2.6: Explain the impact and proper use of environmental controls . 94

Objective 2.7: Execute disaster recovery plans and procedures . 98

Objective 2.8: Exemplify the concepts of confidentiality, integrity, and availability. 105

Quick-Check Answer Key . 108

Objective 2.1: Explain risk related concepts . 108

Objective 2.2: Carry out appropriate risk mitigation strategies 108

Objective 2.3: Execute appropriate incident response procedures 108

Objective 2.4: Explain the importance of security related awareness and training 109

Objective 2.5: Compare and contrast aspects of business continuity . 109

Objective 2.6: Explain the impact and proper use of environmental controls. . 109

Objective 2.7: Execute disaster recovery plans and procedures 110

Objective 2.8: Exemplify the concepts of confidentiality, integrity, and availability. 110

Answers and Explanations . 111

Objective 2.1: Explain risk related concepts . 111

Objective 2.2: Carry out appropriate risk mitigation strategies 117

Objective 2.3: Execute appropriate incident response procedures 118

Objective 2.4: Explain the importance of security related awareness and training 120

Objective 2.5: Compare and contrast aspects of business continuity . 123

Objective 2.6: Explain the impact and proper use of environmental controls. . 125

Objective 2.7: Execute disaster recovery plans and procedures 128

Objective 2.8: Exemplify the concepts of confidentiality, integrity, and availability. 133

Chapter Three Domain 3.0: Threats and Vulnerabilities . 135

Practice Questions . 136

Objective 3.1: Analyze and differentiate among types of malware. 136

Objective 3.2: Analyze and differentiate among types of attacks 144

Objective 3.3: Analyze and differentiate among types of social engineering attacks 154

Objective 3.4: Analyze and differentiate among types of wireless attacks. 156

Objective 3.5: Analyze and differentiate among types of application attacks 160

CompTIA Security+ SY0-301 Practice Questions Exam Cram

Objective 3.6: Analyze and differentiate among types of mitigation and deterrent techniques. 165

Objective 3.7: Implement assessment tools and techniques to discover security threats and vulnerabilities 174

Objective 3.8: Within the realm of vulnerability assessments, explain the proper use of penetration testing versus

vulnerability scanning . 177

Quick-Check Answer Key . 180

Objective 3.1: Analyze and differentiate among types of malware. 180

Objective 3.2: Analyze and differentiate among types of attacks. . 180

Objective 3.3: Analyze and differentiate among types of social engineering attacks 181

Objective 3.4: Analyze and differentiate among types of wireless attacks. 181

Objective 3.5: Analyze and differentiate among types of application attacks 181

Objective 3.6: Analyze and differentiate among types of mitigation and deterrent techniques. 182

Objective 3.7: Implement assessment tools and techniques to discover security threats and vulnerabilities 182

Objective 3.8: Within the realm of vulnerability assessments, explain the proper use of penetration testing versus

vulnerability scanning. 183

Answers and Explanations . 184

Objective 3.1: Analyze and differentiate among types of malware 184

Objective 3.2: Analyze and differentiate among types of attacks. . 191

Objective 3.3: Analyze and differentiate among types of social engineering attacks . 200

Objective 3.4: Analyze and differentiate among types of wireless attacks 202

Objective 3.5: Analyze and differentiate among types of application attacks. . 206

Objective 3.6: Analyze and differentiate among types of mitigation and deterrent techniques 210

Objective 3.7: Implement assessment tools and techniques to discover security threats and vulnerabilities 216

Objective 3.8: Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning. 219

Chapter Four Domain 4.0: Application, Data, and Host Security . 223

Practice Questions . 224

Objective 4.1: Explain the importance of application security . 224

Objective 4.2: Carry out appropriate procedures to establish host security. 232

Objective 4.3: Explain the importance of data security 239

Quick-Check Answer Key . 248

Objective 4.1: Explain the importance of application security . 248

Objective 4.2: Carry out appropriate procedures to establish host security. 248

Objective 4.3: Explain the importance of data security 249

Answers and Explanations . 250

Objective 4.1: Explain the importance of application security . 250

Objective 4.2: Carry out appropriate procedures to establish host security . 257

Objective 4.3: Explain the importance of data security 262

Chapter Five Domain 5.0: Access Control and Identity Management . 269

Practice Questions . 270

Objective 5.1: Explain the function and purpose of authentication services 270

Objective 5.2: Explain the fundamental concepts and best practices related to authorization and access control . 275

Objective 5.3: Implement appropriate security controls when performing account management 285

Quick-Check Answer Key . 293

Objective 5.1: Explain the function and purpose of authentication services 293

Objective 5.2: Explain the fundamental concepts and best practices related to authorization and access control . 293

Objective 5.3: Implement appropriate security controls when performing account management . 294

Answers and Explanations . 295

Objective 5.1: Explain the function and purpose of authentication services 295

Objective 5.2: Explain the fundamental concepts and best practices related to authorization and access control . 299

Objective 5.3: Implement appropriate security controls when performing account management 309

Chapter Six Domain 6.0: Cryptography . 317

Practice Questions . 318

Objective 6.1: Summarize general cryptography concepts . 318

Objective 6.2: Use and apply appropriate cryptographic tools and products 323

Objective 6.3: Explain core concepts of public key infrastructure 329

Objective 6.4: Implement PKI, certificate management, and associated components 333

Quick-Check Answer Key . 338

Objective 6.1: Summarize general cryptography concepts . 338

Objective 6.2: Use and apply appropriate cryptographic tools and products 338

Objective 6.3: Explain core concepts of public key infrastructure 339

Objective 6.4: Implement PKI, certificate management, and associated components 339

Answers and Explanations . 340

Objective 6.1: Summarize general cryptography concepts . 340

Objective 6.2: Use and apply appropriate cryptographic tools and products 343

Objective 6.3: Explain core concepts of public key infrastructure 348

Objective 6.4: Implement PKI, certificate management, and associated components 351

9780789748287, TOC, 11/09/2011


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

CompTIA Security+ SY0-301 Authorized Practice Questions Exam Cram, <i>CompTIA Security+ SY0-301 Practice Questions Exam Cram</i>, Third Edition, offers all the exam practice you'll need to systematically prepare, identify and fix areas of weakness, and pass your exam the first time. This book and CD complement any Securi, CompTIA Security+ SY0-301 Authorized Practice Questions Exam Cram

X
WonderClub Home

This item is in your Collection

CompTIA Security+ SY0-301 Authorized Practice Questions Exam Cram, <i>CompTIA Security+ SY0-301 Practice Questions Exam Cram</i>, Third Edition, offers all the exam practice you'll need to systematically prepare, identify and fix areas of weakness, and pass your exam the first time. This book and CD complement any Securi, CompTIA Security+ SY0-301 Authorized Practice Questions Exam Cram

CompTIA Security+ SY0-301 Authorized Practice Questions Exam Cram

X
WonderClub Home

This Item is in Your Inventory

CompTIA Security+ SY0-301 Authorized Practice Questions Exam Cram, <i>CompTIA Security+ SY0-301 Practice Questions Exam Cram</i>, Third Edition, offers all the exam practice you'll need to systematically prepare, identify and fix areas of weakness, and pass your exam the first time. This book and CD complement any Securi, CompTIA Security+ SY0-301 Authorized Practice Questions Exam Cram

CompTIA Security+ SY0-301 Authorized Practice Questions Exam Cram

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: