2.1. Differentiate between the different ports & protocols, their respective threats and mitigation techniques.

Any computer system connected to any type of network is subject to various methods of attack. The rate at which networked systems are attacked is increasing at an alarming rate. Systems that aren't even connected to the Internet, but just to a private network, may come under attack. There are myriad ways to attack a computer system. Your familiarity with a modest collection of these attacks and how to respond to them is an essential skill for the Security+ exam. The following section discusses common attack methods.

NOTE

For more information on topics in this section, refer to Chapter 2 of the CompTIA Security+ Study Guide, 4th Edition ...

Get CompTIA Security+™: Review Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.