Monitoring and Diagnosing Networks
THE FOLLOWING COMPTIA SECURITY+ EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER:
3.6 Analyze a scenario and select the appropriate type of mitigation and deterrent techniques.
- Monitoring system logs: Event logs; Audit logs; Security logs, Access logs
- Hardening: Disabling unnecessary services; Protecting management interfaces and applications; Password protection; Disabling unnecessary accounts
- Network security: MAC limiting and filtering; 802.1x; Disabling unused interfaces and unused application service ports; Rogue machine detection
- Security posture: Initial baseline configuration; Continuous security ...