CompTIA Security+ Study Guide: SY0-401

CompTIA Security+ Study Guide: SY0-401

Chuck Easttom

Language: English

Pages: 552

ISBN: 1118875079

Format: PDF / Kindle (mobi) / ePub


Join over 250,000 IT professionals who've earned Security+ certification

If you're an IT professional hoping to progress in your career, then you know that the CompTIA Security+ exam is one of the most valuable certifications available. Since its introduction in 2002, over a quarter million professionals have achieved Security+ certification, itself a springboard to prestigious certifications like the CASP, CISSP, and CISA. The CompTIA Security+ Study Guide: SY0-401 covers 100% of the Security+ exam objectives, with clear and concise information on crucial security topics.

You'll find everything you need to prepare for the 2014 version of the Security+ certification exam, including insight from industry experts on a wide range of IT security topics. Readers also get access to a robust set of learning tools, featuring electronic flashcards, assessment tests, robust practice test environment, with hundreds of practice questions, and electronic flashcards.

  • CompTIA authorized and endorsed
  • Includes updates covering the latest changes to the exam, including better preparation for real-world applications
  • Covers key topics like network security, compliance and operational security, threats and vulnerabilities, access control and identity management, and cryptography
  • Employs practical examples and insights to provide real-world context from two leading certification experts
  • Provides the necessary tools to take that first important step toward advanced security certs like CASP, CISSP, and CISA, in addition to satisfying the DoD's 8570 directive

If you're serious about jump-starting your security career, you need the kind of thorough preparation included in the CompTIA Security+ Study Guide: SY0-401.

The Butler's Guide to Running the Home and Other Graces

Learn Enough Text Editor To Be Dangerous (Developer Fundamentals, Book 2)

Georgia Armenia & Azerbaijan (Multi Country Guide)

AppleScript: The Definitive Guide (2nd Edition)

Digital Film-Making

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

render your system unusable. This is common with many of the newer viruses. If your system is infected, the virus may try to attach itself to every file in your system and spread each time you send a file or document to other users. Figure 9.3 shows a virus spreading from an infected system, either through a network or by removable media. When you give removable media to another user or put it into another system, you then infect that system with the virus. Figure 9.3 Virus spreading from an

destinations in routing tables. Routing tables contain information about known hosts on both sides of the router. B. Switches create virtual circuits between systems in a network. These virtual circuits are somewhat private and reduce network traffic when used. B. PPP can pass multiple protocols, and it is widely used today as a transport protocol for dial-up connections. A. PPP provides no security, and all activities are unsecure. PPP is primarily intended for dial-up connections, and it

lost its popularity, you might still encounter it in some texts. The most commonly implemented RAID levels are as follows: RAID Level 0 RAID 0 is disk striping. It uses multiple drives and maps them together as a single physical drive. This is done primarily for performance, not for fault tolerance. If any drive in a RAID 0 array fails, the entire logical drive becomes unusable. RAID Level 1 RAID 1 is disk mirroring. Disk mirroring provides 100 percent redundancy because everything is

your company data at heart. Figure 5.12 Examples of some questionable wireless networks Be sure to change the default password settings on all wireless devices. Never assume that a wireless connection is secure. The emissions from a wireless portal may be detectable through walls and for several city blocks from the portal. Interception is easy to accomplish, given that RF is the medium used for communication. Newer wireless devices offer data security, and you should use it. You can set

systems are updated. With VMware, patch releases are based on the code from the immediately preceding update, and compatibility for patches is assumed to have the same compatibility as the preceding update release. Although this approach differs for each vendor, most follow similar guidelines. Always verify the source of patches and test the patches on lab machines before applying them to production machines. It is possible for one patch not to be compatible with another, and you want to

Download sample

Download