Appendix D
Memory Tables Answer Key
Chapter 3
Table 3-2 Server-Based vs. Agent-Based Scanning
Type |
Technology |
Characteristics |
---|---|---|
Agent based |
Pull technology |
Can get information from disconnected machines or machines in the DMZ Ideal for remote locations that have limited bandwidth Less dependent on network connectivity Based on policies defined on the central console |
Server based |
Push technology |
Good for networks with plentiful bandwidth Dependent on network connectivity Central authority does all the scanning and deployment |
Chapter 8
Table 8-2 Advantages and Disadvantages of SSL/TLS
Advantages |
Disadvantages |
---|---|
Data is encrypted. |
Encryption and decryption require heavy resource usage. |
SSL/TLS is supported on all browsers. ... |
Get CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.