skip to content
CompTIA security+ SY0-301 practice questions Preview this item
ClosePreview this item
Checking...

CompTIA security+ SY0-301 practice questions

Author: Diane Barrett
Publisher: Indianapolis, Ind. : Pearson Education, ©2012.
Series: Exam cram.
Edition/Format:   Print book : English : 3rd edView all editions and formats
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Study guides
Document Type: Book
All Authors / Contributors: Diane Barrett
ISBN: 9780789748287 0789748282
OCLC Number: 712114628
Notes: "CD features 800+ practice questions."--Cover.
"CompTIA authorized"--Cover.
Description: xii, 354 pages ; 23 cm + 1 CD-ROM (4 3/4 in.).
Contents: Introduction . 5 Who This Book Is For 5 What You Will Find in This Book 5 Hints for Using This Book 6 Need Further Study? . 7Chapter One Domain 1.0: Network Security 9 Practice Questions 10 Objective 1.1: Explain the security function and purpose of network devices and technologies 10 Objective 1.2: Apply and implement secure network administration principles . 16 Objective 1.3: Distinguish and differentiate network design elements and compounds . 23 Objective 1.4: Implement and use common protocols 32 Objective 1.5: Identify commonly used ports . 36 Objective 1.6: Implement wireless network in a secure manner 40 Quick-Check Answer Key 44 Objective 1.1: Explain the security function and purpose of network devices and technologies 44 Objective 1.2: Apply and implement secure network administration principles . 44 Objective 1.3: Distinguish and differentiate network design elements and compounds . 45 Objective 1.4: Implement and use common protocols 45 Objective 1.5: Identify commonly used ports . 46 Objective 1.6: Implement wireless network in a secure manner 46 Answers and Explanations 47 Objective 1.1: Explain the security function and purpose of network devices and technologies 47 Objective 1.2: Apply and implement secure network administration principles . 52 Objective 1.3: Distinguish and differentiate network design elements and compounds 58 Objective 1.4: Implement and use common protocols 65 Objective 1.5: Identify commonly used ports . 70 Objective 1.6: Implement wireless network in a secure manner 71Chapter Two Domain 2.0: Compliance and Operational Security . 75 Practice Questions 76 Objective 2.1: Explain risk related concepts. 76 Objective 2.2: Carry out appropriate risk mitigation strategies . 83 Objective 2.3: Execute appropriate incident response procedures . 85 Objective 2.4: Explain the importance of security related awareness and training . 87 Objective 2.5: Compare and contrast aspects of business continuity 92 Objective 2.6: Explain the impact and proper use of environmental controls . 94 Objective 2.7: Execute disaster recovery plans and procedures . 98 Objective 2.8: Exemplify the concepts of confidentiality, integrity, and availability. 105 Quick-Check Answer Key . 108 Objective 2.1: Explain risk related concepts . 108 Objective 2.2: Carry out appropriate risk mitigation strategies 108 Objective 2.3: Execute appropriate incident response procedures 108 Objective 2.4: Explain the importance of security related awareness and training 109 Objective 2.5: Compare and contrast aspects of business continuity . 109 Objective 2.6: Explain the impact and proper use of environmental controls. . 109 Objective 2.7: Execute disaster recovery plans and procedures 110 Objective 2.8: Exemplify the concepts of confidentiality, integrity, and availability. 110 Answers and Explanations . 111 Objective 2.1: Explain risk related concepts . 111 Objective 2.2: Carry out appropriate risk mitigation strategies 117 Objective 2.3: Execute appropriate incident response procedures 118 Objective 2.4: Explain the importance of security related awareness and training 120 Objective 2.5: Compare and contrast aspects of business continuity . 123 Objective 2.6: Explain the impact and proper use of environmental controls. . 125 Objective 2.7: Execute disaster recovery plans and procedures 128 Objective 2.8: Exemplify the concepts of confidentiality, integrity, and availability. 133Chapter Three Domain 3.0: Threats and Vulnerabilities . 135 Practice Questions . 136 Objective 3.1: Analyze and differentiate among types of malware. 136 Objective 3.2: Analyze and differentiate among types of attacks 144 Objective 3.3: Analyze and differentiate among types of social engineering attacks 154 Objective 3.4: Analyze and differentiate among types of wireless attacks. 156 Objective 3.5: Analyze and differentiate among types of application attacks 160 CompTIA Security+ SY0-301 Practice Questions Exam Cram Objective 3.6: Analyze and differentiate among types of mitigation and deterrent techniques. 165 Objective 3.7: Implement assessment tools and techniques to discover security threats and vulnerabilities 174 Objective 3.8: Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning . 177 Quick-Check Answer Key . 180 Objective 3.1: Analyze and differentiate among types of malware. 180 Objective 3.2: Analyze and differentiate among types of attacks. . 180 Objective 3.3: Analyze and differentiate among types of social engineering attacks 181 Objective 3.4: Analyze and differentiate among types of wireless attacks. 181 Objective 3.5: Analyze and differentiate among types of application attacks 181 Objective 3.6: Analyze and differentiate among types of mitigation and deterrent techniques. 182 Objective 3.7: Implement assessment tools and techniques to discover security threats and vulnerabilities 182 Objective 3.8: Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning. 183 Answers and Explanations . 184 Objective 3.1: Analyze and differentiate among types of malware 184 Objective 3.2: Analyze and differentiate among types of attacks. . 191 Objective 3.3: Analyze and differentiate among types of social engineering attacks . 200 Objective 3.4: Analyze and differentiate among types of wireless attacks 202 Objective 3.5: Analyze and differentiate among types of application attacks. . 206 Objective 3.6: Analyze and differentiate among types of mitigation and deterrent techniques 210 Objective 3.7: Implement assessment tools and techniques to discover security threats and vulnerabilities 216 Objective 3.8: Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning. 219Chapter Four Domain 4.0: Application, Data, and Host Security . 223 Practice Questions . 224 Objective 4.1: Explain the importance of application security . 224 Objective 4.2: Carry out appropriate procedures to establish host security. 232 Objective 4.3: Explain the importance of data security 239 Quick-Check Answer Key . 248 Objective 4.1: Explain the importance of application security . 248 Objective 4.2: Carry out appropriate procedures to establish host security. 248 Objective 4.3: Explain the importance of data security 249 Answers and Explanations . 250 Objective 4.1: Explain the importance of application security . 250 Objective 4.2: Carry out appropriate procedures to establish host security . 257 Objective 4.3: Explain the importance of data security 262Chapter Five Domain 5.0: Access Control and Identity Management . 269 Practice Questions . 270 Objective 5.1: Explain the function and purpose of authentication services 270 Objective 5.2: Explain the fundamental concepts and best practices related to authorization and access control . 275 Objective 5.3: Implement appropriate security controls when performing account management 285 Quick-Check Answer Key . 293 Objective 5.1: Explain the function and purpose of authentication services 293 Objective 5.2: Explain the fundamental concepts and best practices related to authorization and access control . 293 Objective 5.3: Implement appropriate security controls when performing account management . 294 Answers and Explanations . 295 Objective 5.1: Explain the function and purpose of authentication services 295 Objective 5.2: Explain the fundamental concepts and best practices related to authorization and access control . 299 Objective 5.3: Implement appropriate security controls when performing account management 309Chapter Six Domain 6.0: Cryptography . 317 Practice Questions . 318 Objective 6.1: Summarize general cryptography concepts . 318 Objective 6.2: Use and apply appropriate cryptographic tools and products 323 Objective 6.3: Explain core concepts of public key infrastructure 329 Objective 6.4: Implement PKI, certificate management, and associated components 333 Quick-Check Answer Key . 338 Objective 6.1: Summarize general cryptography concepts . 338 Objective 6.2: Use and apply appropriate cryptographic tools and products 338 Objective 6.3: Explain core concepts of public key infrastructure 339 Objective 6.4: Implement PKI, certificate management, and associated components 339 Answers and Explanations . 340 Objective 6.1: Summarize general cryptography concepts . 340 Objective 6.2: Use and apply appropriate cryptographic tools and products 343 Objective 6.3: Explain core concepts of public key infrastructure 348 Objective 6.4: Implement PKI, certificate management, and associated components 3519780789748287, TOC, 11/09/2011
Series Title: Exam cram.
Other Titles: Security+ SY0-301 practice questions
Responsibility: Diane Barrett.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/712114628> # CompTIA security+ SY0-301 practice questions
    a schema:Book, schema:CreativeWork ;
    library:oclcnum "712114628" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/inu> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/3860753616#Place/indianapolis_ind> ; # Indianapolis, Ind.
    schema:about <http://id.worldcat.org/fast/872343> ; # Computer networks--Security measures--Examinations
    schema:about <http://id.worldcat.org/fast/872489> ; # Computer security--Examinations
    schema:about <http://id.worldcat.org/fast/907100> ; # Electronic data processing personnel--Certification
    schema:about <http://experiment.worldcat.org/entity/work/data/3860753616#Topic/computer_security_examinations> ; # Computer security--Examinations
    schema:about <http://experiment.worldcat.org/entity/work/data/3860753616#Topic/computer_technicians_certification> ; # Computer technicians--Certification
    schema:about <http://experiment.worldcat.org/entity/work/data/3860753616#Topic/computer_networks_security_measures_examinations> ; # Computer networks--Security measures--Examinations
    schema:about <http://dewey.info/class/005.4476/e23/> ;
    schema:about <http://id.loc.gov/authorities/subjects/sh2008102941> ; # Electronic data processing personnel--Certification
    schema:about <http://id.worldcat.org/fast/872659> ; # Computer technicians--Certification
    schema:alternateName "Security+ SY0-301 practice questions" ;
    schema:bookEdition "3rd ed." ;
    schema:bookFormat bgn:PrintBook ;
    schema:copyrightYear "2012" ;
    schema:creator <http://viaf.org/viaf/29045690> ; # Diane Barrett
    schema:datePublished "2012" ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/3860753616> ;
    schema:genre "Study guides"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/3860753616#Series/exam_cram> ; # Exam cram.
    schema:name "CompTIA security+ SY0-301 practice questions"@en ;
    schema:productID "712114628" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/712114628#PublicationEvent/indianapolis_ind_pearson_education_2012> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/3860753616#Agent/pearson_education> ; # Pearson Education
    schema:workExample <http://worldcat.org/isbn/9780789748287> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/712114628> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/3860753616#Agent/pearson_education> # Pearson Education
    a bgn:Agent ;
    schema:name "Pearson Education" ;
    .

<http://experiment.worldcat.org/entity/work/data/3860753616#Place/indianapolis_ind> # Indianapolis, Ind.
    a schema:Place ;
    schema:name "Indianapolis, Ind." ;
    .

<http://experiment.worldcat.org/entity/work/data/3860753616#Series/exam_cram> # Exam cram.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/712114628> ; # CompTIA security+ SY0-301 practice questions
    schema:name "Exam cram." ;
    schema:name "Exam cram" ;
    .

<http://experiment.worldcat.org/entity/work/data/3860753616#Topic/computer_networks_security_measures_examinations> # Computer networks--Security measures--Examinations
    a schema:Intangible ;
    rdfs:seeAlso <http://id.loc.gov/authorities/subjects/sh2009121234> ;
    schema:name "Computer networks--Security measures--Examinations"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh2008102941> # Electronic data processing personnel--Certification
    a schema:Intangible ;
    schema:name "Electronic data processing personnel--Certification"@en ;
    .

<http://id.worldcat.org/fast/872343> # Computer networks--Security measures--Examinations
    a schema:Intangible ;
    schema:name "Computer networks--Security measures--Examinations"@en ;
    .

<http://id.worldcat.org/fast/872489> # Computer security--Examinations
    a schema:Intangible ;
    schema:name "Computer security--Examinations"@en ;
    .

<http://id.worldcat.org/fast/872659> # Computer technicians--Certification
    a schema:Intangible ;
    schema:name "Computer technicians--Certification"@en ;
    .

<http://id.worldcat.org/fast/907100> # Electronic data processing personnel--Certification
    a schema:Intangible ;
    schema:name "Electronic data processing personnel--Certification"@en ;
    .

<http://viaf.org/viaf/29045690> # Diane Barrett
    a schema:Person ;
    schema:familyName "Barrett" ;
    schema:givenName "Diane" ;
    schema:name "Diane Barrett" ;
    .

<http://worldcat.org/isbn/9780789748287>
    a schema:ProductModel ;
    schema:isbn "0789748282" ;
    schema:isbn "9780789748287" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.