Chapter 2

Monitoring and Diagnosing Networks

THE FOLLOWING COMPTIA SECURITY+ EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER:

images 3.6 Analyze a scenario and select the appropriate type of mitigation and deterrent techniques.

  • Monitoring system logs: Event logs; Audit logs; Security logs, Access logs
  • Hardening: Disabling unnecessary services; Protecting management interfaces and applications; Password protection; Disabling unnecessary accounts
  • Network security: MAC limiting and filtering; 802.1x; Disabling unused interfaces and unused application service ports; Rogue machine detection
  • Security posture: Initial baseline configuration; Continuous security ...

Get CompTIA Security+ Study Guide: SY0-401, 6th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.