Appendix D

Memory Tables Answer Key

Chapter 3

Table 3-2 Server-Based vs. Agent-Based Scanning

Type

Technology

Characteristics

Agent based

Pull technology

Can get information from disconnected machines or machines in the DMZ

Ideal for remote locations that have limited bandwidth

Less dependent on network connectivity

Based on policies defined on the central console

Server based

Push technology

Good for networks with plentiful bandwidth

Dependent on network connectivity

Central authority does all the scanning and deployment

Chapter 8

Table 8-2 Advantages and Disadvantages of SSL/TLS

Advantages

Disadvantages

Data is encrypted.

Encryption and decryption require heavy resource usage.

SSL/TLS is supported on all browsers. ...

Get CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.