Chapter 18
Security Assessments and Audits
CERTIFICATION OBJECTIVES
18.01 Understanding Types of Assessments
18.02 Performing a Security Assessment
QQUESTIONS
Periodic testing of computer systems and networks over time identifies security weaknesses. Security assessments are best conducted by a third party and may be required by government regulation or to acquire business contracts. As a Security+ professional, you must know when to use various tools and how to interpret their results.
1. As part of your security audit, you would like to see what type of network traffic is being transmitted on the network. Which type of tool should you use?
A. Protocol analyzer
B. Port scanner
C. Vulnerability scanner
D. Password cracker ...
Get CompTIA Security+ Certification Practice Exams, Third Edition (Exam SY0-501), 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.