Chapter 2
Monitoring and Diagnosing Networks
THE FOLLOWING COMPTIA SECURITY+ EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER:
3.6 Analyze a scenario and select the appropriate type of mitigation and deterrent techniques.
- Monitoring system logs: Event logs; Audit logs; Security logs, Access logs
- Hardening: Disabling unnecessary services; Protecting management interfaces and applications; Password protection; Disabling unnecessary accounts
- Network security: MAC limiting and filtering; 802.1x; Disabling unused interfaces and unused application service ports; Rogue machine detection
- Security posture: Initial baseline configuration; Continuous security ...
Get CompTIA Security+ Study Guide: SY0-401, 6th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.