Appendix C
Memory Tables
Chapter 3
Table 3-2 Server-Based vs. Agent-Based Scanning
Type |
Technology |
Characteristics |
---|---|---|
Agent based |
|
|
Server based |
|
|
Chapter 8
Table 8-2 Advantages and Disadvantages of SSL/TLS
Advantages |
Disadvantages |
---|---|
|
|
|
|
|
|
Table 8-3 Examples of Logging Configuration Settings
Category |
Low-Impact System |
Moderate-Impact System |
High-Impact System |
---|---|---|---|
Log retention duration |
1–2 weeks |
|
|
Log rotation |
|
Every 6–24 hours, or every 2–5 MB |
|
Log data transfer frequency (to SIEM) |
|
|
At least every 5 minutes |
Local log data analysis |
|
|
|
File integrity check for rotated logs? |
|
|
|
Encrypt rotated logs? |
|
|
|
Encrypt log data transfers to SIEM? |
|
|
|
Get CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.