... Chapter 1 ã General Security Concepts: Access Control, Authentication, and Auditing
Introduction
Security+ is a security fundamentals and concepts exam. No security concepts
exam would be complete ... wide range of security concepts, including:
■
General security concepts
■
Communications security
■
Infrastructure security
■
Basics of cryptography
■
Operational/organizational security
Foreword
xv
435_Sec2e_Fore.qxd ... General Security Concepts: Access Control, Authentication, and Auditing
Summary of Exam Objectives
In this chapter, you worked on concepts tested in the Security+ exam relating to
general security...
... acronyms used in the Security+ exam. For purposes of the
Security+ exam, two specific abbreviations need to be explained to avoid
confusion. For general securitystudy and the Security+ exam, AAA is
defined ... the
CompTIA objectives.Throughout this study guide, you will find numbered icons in
the margin indicating which CompTIA Security+ exam objective is being covered.
You will find a complete guide ... 3:35 PM Page xvi
4 Domain 1.0 ã General Security Concepts
Introduction
Security+ is a security fundamentals and concepts exam. No security concepts
exam would be complete without questions on...
... technical editor for Security+ StudyGuide
and DVD Training System, (ISBN: 978-1-931836-72-2, Syngress), lead
author and technical editor for Network+ StudyGuide & Practice Exams:
Exam N10-003, ... 1597492126), Microsoft Forefront
Security Administration Guide (ISBN: 1597492447), and The Real MCTS/
MCITP Windows Server 2008 Configuring Applications Infrastructure Exam
70-643 Prep Kit (ISBN: ... to Microsoft Vista for IT Security Professionals, (ISBN: 978-1-
59749-139-6), a contributing author to The Real MCTS/MCITP Configuring
Microsoft Windows Vista Client Exam 70-620 Prep Kit, (ISBN:...
... words, it is how hard you can pull on the cable
when you’re installing or working with it. For example, with Category 5
UTP cabling, if more than 25 pounds of force is applied to the cabling ... otherwise affected. Category 5 UTP cables allow a bend radius
of four times the cable’s diameter. For example, if the cable is 1/4 inch in
diameter, you can bend it 1 inch. Although the bend radius ... adapter is a way to test the ports on a system without
having to connect to an external device. For example, you can use a serial
loopback adapter to verify that a transmitted signal is leaving your...
...
resources and transmit data across the switch.
SUMMARY OF EXAM OBJECTIVES
Switches can provide an array of features that can enhance the security and
functionality of a network. At its most basic ...
the port is allowed, so that it can then transfer data across the switch and
over the network.
Exam Objectives Fast Track 163
Multilayer Switches
A multilayer switch (also called a Layer 3 ... connected using a single network link,
Trunking Protocols may be used to provide connectivity. Security features
like port authentication can be used to require a client to authenticate to a...
...
ethereal.
235
CHAPTER 6
EXAM OBJECTIVES IN THIS CHAPTER
THE OSI MODEL 237
THE DOD NETWORKING MODEL 257
NETWORKING PROTOCOLS 265
INTRODUCTION
To prepare for the CompTIA Network exam, you should begin ... their components are installed.
EXAM OBJECTIVES FREQUENTLY ASKED QUESTIONS
Do I really need to understand the fundamentals of security to Q:
prepare for the Network exam?
Yes. While you might be ... the networking protocols.
Both are covered in great detail on the exam and need to be completely
understood before sitting the exam if you want success.
The vast majority of networks today (including...
... Internet. A good example of this is that many computers
Exam Warning
Using VLSMs on WAN links on your network is very common. You don’t need to know
how to do this for the Network+ exam, but you ... select
another address from that range.
Exam Warning
You must know the private address ranges as well as the APIPA IP address range for the
Network+ exam. Also, do not forget the reserved loopback ... octet.
You should work through lots of examples so that
you can fully understand both the concepts and the
practical applications of subnetting. Work through the
examples in this chapter and make...
... as reliable as possible, but at a cost in terms of time to
both you and the intended recipient.
Exam Warning
As a provider of connection-oriented services, TCP first establishes a virtual connection ... system (which is formally called PSTN
or Public Switched Telephone Network) is the most
familiar example of switched-circuit communication.
An end-to-end communication link is established when ... physical path
from one end (your telephone) to the other (Aunt Mary’s
telephone in Boise, Idaho, for example) is maintained
for the duration of that call. The path is reserved until
you break the...
... con-
nect to the mail.example.com server, you would type telnet mail.
example.com 25 at the command prompt. If this is successful,
you’ll see something like this:
220 mail.example.com Microsoft ... Exam Objectives Frequently Asked Questions 625
You can use Telnet to connect to specific ports on a server to see if
the HTTP, SMTP, and FTP protocols are functioning.
EXAM OBJECTIVES ... window. Begin by typing the following (substitute the
domain of a valid e-mail address for example.com):
HELO example.com
If this command works, you’ll see the following:4.
250 OK
Next, specify...
... Data Exchange: Sublayer
802.10g Standard for Security Labeling Within Secure Data Exchange
802.10h Supplement to Interoperable LM Security: PICS Proforma /Security Data
802.11 Standard for WLAN. Standard ... have no overlap
of coverage area.
Exam Warning
IEEE standards are an important part of networking, and chances are that you’ll see
questions on them during the exam. You’ll be tested on the main ... developed for
networking, the Network+ exam only expects you to know the basic funda-
mentals of a select few. The standards that will be referenced in the exam
and that we’ll discuss in this...
... functions as a translator between two dissimilar networks so that
both are able to communicate. For example, if your Ethernet network is to be
connected to a Token Ring network, you will need to...
... Sarbanes-Oxley
Act of 2002. As an organization that has computer networks and recognizes
information security as an important role in how to develop your networks,
you must be aware of ISO/IEC 27002:2005....