Mike Meyers' CompTIA Security+ Certification Passport, Fourth Edition (Exam SY0-401) (Mike Meyers' Certficiation Passport)

Mike Meyers' CompTIA Security+ Certification Passport, Fourth Edition (Exam SY0-401) (Mike Meyers' Certficiation Passport)

Dawn Dunkerley

Language: English

Pages: 480

ISBN: 0071832149

Format: PDF / Kindle (mobi) / ePub


From the #1 Name in Professional Certification

Prepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional―a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.

Get on the fast track to becoming CompTIA Security+ certified with this affordable, portable study tool--fully revised for the latest exam release. Inside, certification training experts guide you on your career path, providing expert tips and sound advice along the way. With an intensive focus only on what you need to know to pass CompTIA Security+ Exam SY0-401, this certification passport is your ticket to success on exam day.

INSIDE:

  • Itineraries -- List of official exam objectives covered
  • ETAs -- Amount of time needed to complete each lesson
  • Travel Advisories -- Expert advice on critical topics
  • Local Lingo -- Concise definitions of key terms and concepts
  • Travel Assistance -- Recommended resources for more information
  • Exam Tips -- Common exam pitfalls and solutions
  • Checkpoints -- End-of-chapter questions, answers, and explanations
  • Career Flight Path -- Information on the exam and possible next steps

Electronic content includes:

  • 200 practice exam questions
  • PDF copy of the book

Cloud Computing for Dummies

Practical Unix & Internet Security (3rd Edition)

Computers in Swedish Society: Documenting Early Use and Trends (History of Computing)

The Definitive Guide to Apache mod_rewrite

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

types of attacks that can occur against a network, it is useful to know the basic underlying protocols of Internet-based computer networks and the application protocols that use them. TCP/IP The Transmission Control Protocol/Internet Protocol (TCP/IP) is the most basic communications protocol of the Internet. TCP/IP communications are point-to-point, and together the two aspects of the protocol, TCP and IP, manage and route network messages. TCP/IP is a request/connection type of protocol,

your wireless network: •    Clear or open areas provide better radio range than closed or filled areas. •    Metal physical obstruction can hinder the performance of wireless devices. Avoid placing these devices in a location where a metal barrier is situated between the sending and receiving antennas. •    Radio penetration is affected by the materials used in the building construction. Drywall construction allows greater range than concrete blocks, while metal construction can hinder and

since a UDP request will receive a “host unreachable” message via ICMP in response. If no response is received, the port is open and listening for requests. However, this method is not foolproof, because if the port is blocked by a firewall, the user/attacker will receive no response and might assume the port is open. Port scanners are often built into popular network mapping and vulnerability assessment tools, such as Nmap, because they provide the foundation for determining what services and

If any security issues arise, a list is available of everyone who was in the building at that time. Access logs are also important for highly sensitive areas of an organization such as the main server and telecommunications room that houses the primary system and networking equipment. Each administrator should record times of entry and departure of the server room to perform duties or maintenance. Any security issues that arise in regard to activities in the server room can be tracked to whoever

duty, might be more inclined to take advantage of their position and enhanced access. 7.   B   By setting time restrictions on network access, you prevent employees from being able to log in and access the network after working hours are complete. 8.   D   You can limit logon attempts to lock out the user’s account if an incorrect password has been entered too many times. While password length, complexity, rotation, and expiration are helpful security measures, brute-force attacks can most

Download sample

Download