Chapter 2. Identifying Potential Risks

THE FOLLOWING COMPTIA SECURITY+ EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER:

  • 1.1 Differentiate among various systems' security threats.

    • Privilege escalation

    • Virus

    • Worm

    • Trojan

    • Spyware

    • Spam

    • Adware

    • Rootkits

    • Botnets

    • Logic bomb

  • 1.5 Implement security applications.

    • Antivirus

    • Anti-spam

  • 2.1 Differentiate between the different ports and protocols, their respective threats and mitigation techniques.

    • Antiquated protocols

    • TCP/IP hijacking

    • Null sessions

    • Spoofing

    • Man-in-the-middle

    • Replay

    • DoS

    • DDoS

    • Domain Name Kiting

    • DNS poisoning

  • 2.5 Explain the vulnerabilities and mitigations associated with network devices.

    • Privilege escalation

    • Weak passwords

    • Back doors

    • DoS

  • 4.2 Carry out vulnerability assessments using common tools.

    • Vulnerability scanners

    • OVAL

    • Password ...

Get CompTIA Security+™: Study Guide, Fourth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.