Chapter 18

Security Assessments and Audits

CERTIFICATION OBJECTIVES

18.01     Understanding Types of Assessments

18.02     Performing a Security Assessment

QQUESTIONS

Periodic testing of computer systems and networks over time identifies security weaknesses. Security assessments are best conducted by a third party and may be required by government regulation or to acquire business contracts. As a Security+ professional, you must know when to use various tools and how to interpret their results.

1.   As part of your security audit, you would like to see what type of network traffic is being transmitted on the network. Which type of tool should you use?

A.   Protocol analyzer

B.   Port scanner

C.   Vulnerability scanner

D.   Password cracker ...

Get CompTIA Security+ Certification Practice Exams, Third Edition (Exam SY0-501), 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.