Security+ SY0-601
Domains
Domain | Percentage |
---|---|
1.0 Attacks, Threats, and Vulnerabilities | 24% |
2.0 Architecture and Design | 21% |
3.0 Implementation | 25% |
4.0 Operations and Incident Response | 16% |
5.0 Governance, Risk, and Compliance | 14% |
Ports
-
80 - HTTP
-
443 - HTTPS
-
389 - LDAP
CIA Triad
Confidentiality, Integrity, Availability
OSI Model Layers
- The Physical Layer.
- The Data Link Layer.
- The Network Layer.
- Devices: Router - allows different logical networks to communicate.
- The Transport Layer.
- The Session Layer.
- The Presentation Layer.
- The Application Layer.
Security Devices
All-in-one security Devices
- Url Filtering
- content inspection
- malware inspection
Attacks
- Replay attack -
- protected against by -> Challenge Handshake Authentication Protocol (CHAP)
- Mathematical Attack - attack on a cryptographic algorithm using brute force methods to encrypt text strings until the output matches the ciphertext
Terms
Multi-factor Authentication - Auth combining two or more authentication methods such as a password, smart card, fingerprint, etc. Audit - determines whether network security practices follow a company's security policy Business Continuity Plan Business Impact Analysis (BIA)
Disaster Recovery Plan (DRP) - Lists the steps to take in case of IT disaster on main IT site MTD (Maximum Tolerable Downtime) - Maximum time a business can have system downtime Integrity Measurement - monitoring a device to ensure it has not deviated from the secure baseline
Certificate Revocation List (CRL) - Cancelled certificate information list
Service Pack - a collection of hotfixes combined into a single patch
Malware
Pharming - traffic redirection to a website that looks identical to the intended website Trojan Horse - malware disguised as a file or useful utility, that is embedded with malicious code