Recognize and be able to differentiate and explain the following access control models:
MAC (Mandatory Access Control)
DAC (Discretionary Access Control)
RBAC (Role Based Access Control)
Recognize and be able to differentiate and explain the following methods of authentication:
CHAP (Challenge Handshake Authentication Protocol)
Identify non-essential services and protocols, and know what actions to take to reduce the risks of those services and protocols.
Recognize the following attacks and specify the appropriate actions to take to mitigate vulnerability and risk:
DOS/DDOS (Denial of Service / Distributed Denial of Service)
Man in the Middle
Password guessing using brute force and the dictionary
Recognize the following types of malicious code and specify appropriate actions to take to mitigate vulnerability and risk:
Understand the concept of and know how to reduce the risks of social engineering.
Understand the concept and significance of auditing, logging, and system scanning.
Recognize and understand the administration of the following types of remote access technologies:
VPN (Virtual Private Network)
RADIUS (Remote Authentication Dial-In User Service)
TACACS (Terminal Access Controller Access Control ...