CompTIA Security+ Study Guide: Exam SY0-201 by Emmett Dulaney

By Emmett Dulaney

Revised and up to date to incorporate the main updated info, CompTIA safeguard+ research consultant, 4th Edition grants entire assurance of the protection+ examination pursuits with transparent and concise details on an important safeguard subject matters. examine from useful examples and insights drawn from real-world event and evaluate your newly got wisdom with state-of-the-art examination guidance software program, together with a attempt engine and digital flashcards. locate authoritative insurance of key examination subject matters like common defense techniques, communique safety, infrastructure defense, the fundamentals of cryptography and operational and organizational defense.
Note: CD-ROM/DVD and different supplementary fabrics usually are not incorporated as a part of e-book file.

For teachers: Teaching supplementations can be found for this title.

Show description

Read Online or Download CompTIA Security+ Study Guide: Exam SY0-201 PDF

Best comptia books

Privacy Protection and Computer Forensics(Artech House Computer Security Series)

This revised variation of an Artech apartment bestseller is going a ways past the common machine forensics books out there, emphasizing how you can shield one's privateness from information robbery and adverse laptop forensics. the second one version has been up to date to provide extra particular how-to tips on retaining the confidentiality of information saved on desktops, and particular info at the vulnerabilities of well-known ancillary computing units, reminiscent of PDAs, mobile phones, clever playing cards, GPS units, cellphone calling playing cards, fax machines, and photocopiers.

Security in RFID and Sensor Networks

Some time past numerous years, there was an expanding development within the use of Radio Frequency id (RFID) and instant Sensor Networks (WSNs) in addition to within the integration of either structures as a result of their complementary nature, versatile blend, and the call for for ubiquitous computing. As regularly, sufficient safeguard continues to be one of many open components of shock prior to vast deployment of RFID and WSNs may be completed.

Foundations of Security Analysis and Design II

Defense is a swiftly transforming into zone of laptop technology, with direct and lengthening relevance to real-life purposes, akin to web transactions, e-commerce, details defense, community and platforms protection, and so forth. Foundations for the research and layout of security measures of such purposes are badly wanted so as to validate and turn out their correctness.

Network Security Policies and Procedures (Advances in Information Security)

Corporation community directors are pressured this day to aggressively pursue a powerful community safeguard regime. This e-book goals to offer the reader a robust, multi-disciplinary figuring out of the way to pursue this objective. This specialist quantity introduces the technical concerns surrounding safeguard in addition to how protection regulations are formulated on the govt point and communicated during the association.

Extra info for CompTIA Security+ Study Guide: Exam SY0-201

Example text

D. Online Certificate Status Protocol (OCSP) is the mechanism used to immediately verify whether a certificate is valid. The Certificate Revocation List (CRL) is published on a regular basis, but it isn’t current once it’s published. For additional information, see Chapter 7. 14. B. Partitioning is the process of breaking a network into smaller components that can each be individually protected. The concept is the same as building walls in an office building. For additional information, see Chapter 6.

These packages may require the use of a specific operating system. If that operating system has significant security problems or vulnerabilities, your duties will be mammoth because you’ll still be responsible for providing security in that environment. For example, when your secure corporate network is connected to the Internet, it becomes subject to many potential vulnerabilities. You can install hardware and software to improve security, but management may decide these measures cost too much to implement.

B. The Key Exchange Algorithm (KEA) is used to create a temporary session to exchange key information. This session creates a secret key. When the key has been exchanged, the regular session begins. For more information, see Chapter 7. 26. A. Elliptic Curve Cryptography (ECC) would probably be your best choice for a PDA. ECC is designed to work with smaller processors. The other systems may be options, but they require more computing power than ECC. For additional information, see Chapter 7. 27.

Download PDF sample

Rated 4.42 of 5 – based on 37 votes