O'Reilly logo

CompTIA A+ Complete Study Guide by Toby Skandier, Emmett Dulaney, Quentin Docter

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 19 Security

THE FOLLOWING COMPTIA A+ 220–902 EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER:

  • ✓ 3.1 Identify common security threats and vulnerabilities.
    • Malware: spyware, viruses, worms, trojans, rootkits, ransomware
    • Phishing
    • Spear phishing
    • Spoofing
    • Social engineering
    • Shoulder surfing
    • Zero day attack
    • Zombie/botnet
    • Brute forcing
    • Dictionary attacks
    • Non-compliant systems
    • Violations of security best practices
    • Tailgating
    • Man-in-the-middle
  • ✓ 3.2 Compare and contrast common prevention methods.
    • Physical security: Lock doors, Mantrap, Cable locks, Securing physical documents/passwords/shredding, Biometrics, ID badges, Key fobs, RFID badge, Smart card, Tokens, Privacy filters, Entry control roster
    • Digital security: antivirus/antimalware, firewalls, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required