Book description
The Security+ exam certifies that candidates have demonstrated the aptitude and ability to master general security concepts, communications security, infrastructure security, basics of cryptography, and operation/organizational security. Security+ is taught at Excelsior College, Capella University, and Ivy Tech. Several key industry leaders back this exam, including IBM, ISACA, Microsoft, Motorola, Novell, Symantec, Tivoli, Sun Microsystems, and VeriSign. The Security+ Certification Practice Questions Exam Cram 2 (SYO-101) provides readers with over 500 practice test questions as well as complete answer explanations, giving readers the perfect complementary tool for their Security+ studies. Features relevant Exam Notes to help readers score better on the tests, plus the ever-popular "Cram Sheet" tear card, which is used for last minute cramming.
Table of contents
- Copyright
- A Note from Series Editor Ed Tittel
- Expand Your Certification Arsenal!
- About the Author
- We Want to Hear from You!
- Introduction
-
1. General Security Concepts
- Objective 1.1: Access Control
- Objective 1.2: Authentication
- Objective 1.3: Nonessential Services and Protocols
-
Objective 1.4: Attacks
- Objective 1.4.1: DOS/DDOS
- Objective 1.4.2: Back Door
- Objective 1.4.3: Spoofing
- Objective 1.4.4: Man in the Middle
- Objective 1.4.5: Replay
- Objective 1.4.6: TCP/IP Hijacking
- Objective 1.4.7: Weak Keys
- Objective 1.4.8: Mathematical
- Objective 1.4.9: Social Engineering
- Objective 1.4.10: Birthday
- Objective 1.4.11: Password Guessing
- Objective 1.4.12: Software Exploitation
- Objective 1.4.12: SYN attack
- Objective 1.4.12: Buffer Overflow
- Objective 1.5.1: Virus
- Objective 1.5.2: Trojan Horses
- Objective 1.5.3: Logic Bombs
- 1.5.4: Worms
- Objective 1.6: Social Engineering
- Objective 1.7: Auditing, Logging, and System Scanning
-
Quick Check Answer Key
- Objective 1.1: Access Control
- Objective 1.2: Authentication
- Objective 1.3: Nonessential Services and Protocols
-
Objective 1.4: Attacks
- Objective 1.4.1: DOS/DDOS
- Objective 1.4.2: Back Door
- Objective 1.4.3: Spoofing
- Objective 1.4.4: Man in the Middle
- Objective 1.4.5: Replay
- Objective 1.4.6: TCP/IP Hijacking
- Objective 1.4.7: Weak Keys
- Objective 1.4.8: Mathematical
- Objective 1.4.9: Social Engineering
- Objective 1.4.10: Birthday
- Objective 1.4.11: Password Guessing
- Objective 1.4.12: Software Exploitation
- Objective 1.4.12: SYN attack
- Objective 1.4.12: Buffer Overflow
- Objective 1.5.1: Virus
- Objective 1.5.2: Trojan Horses
- Objective 1.5.3: Logic Bombs
- 1.5.4: Worms
- Objective 1.6: Social Engineering
- Objective 1.7: Auditing, Logging, and System Scanning
-
Answers and Explanations
- Objective 1.1: Access Control
- Objective 1.2: Authentication
- Objective 1.3: Nonessential Services and Protocols
-
Objective 1.4: Attacks
- Objective 1.4.1: DOS/DDOS
- Objective 1.4.2: Back Door
- Objective 1.4.3: Spoofing
- Objective 1.4.4: Man in the Middle
- Objective 1.4.5: Replay
- Objective 1.4.6: TCP/IP Hijacking
- Objective 1.4.7: Weak Keys
- Objective 1.4.8: Mathematical
- Objective 1.4.9: Social Engineering
- Objective 1.4.10: Birthday
- Objective 1.4.11: Password Guessing
- Objective 1.4.12: Software Exploitation
- Objective 1.4.12: SYN attack
- Objective 1.4.12: Buffer Overflow
- Objective 1.5.1: Virus
- Objective 1.5.2: Trojan Horses
- Objective 1.5.3: Logic Bombs
- 1.5.4: Worms
- Objective 1.6: Social Engineering
- Objective 1.7: Auditing, Logging, and System Scanning
-
2. Communication Security
- Objective 2.1: Remote Access
- Objective 2.2: Email
- Objective 2.3: Web
- Objective 2.4: Directory—Recognition Not Administration
- Objective 2.5: File Transfer
- Objective 2.6: Wireless
-
Quick Check Answer Key
- Objective 2.1: Remote Access
- Objective 2.2: Email
- Objective 2.3: Web
- Objective 2.4: Directory—Recognition Not Administration
- Objective 2.5: File Transfer
- Objective 2.6: Wireless
-
Answers and Explanations
- Objective 2.1: Remote Access
- Objective 2.2: Email
- Objective 2.3: Web
- Objective 2.4: Directory—Recognition Not Administration
- Objective 2.5: File Transfer
- Objective 2.6: Wireless
-
3. Infrastructure Security
-
Objective 3.1: Devices
- Objective 3.1.1: Firewalls
- Objective 3.1.2: Routers
- Objective 3.1.3: Switches
- Objective 3.1.4: Wireless
- Objective 3.1.5: Modems
- Objective 3.1.6: RAS
- Objective 3.1.7: Telecom/PBX
- Objective 3.1.8: VPN
- Objective 3.1.9: IDS
- Objective 3.1.10: Network Monitoring/Diagnostic
- Objective 3.1.11: Workstations
- Objective 3.1.12: Servers
- Objective 3.1.13. Mobile Devices
- Objective 3.2: Media
- Objective 3.3: Security Topologies
- Objective 3.4: Intrusion Detection
-
Objective 3.5: Security Baselines
- Objectives 3.5.1: OS/NOS Hardening (Concepts and Processes)
- Objective 3.5.2: Network Hardening
-
Objective 3.5.3: Application Hardening
- Objective 3.5.3.1: Updates (Hotfixes, Service Packs, and Patches)
- Objective 3.5.3.2: Web Servers
- Objective 3.5.3.3: Email Servers
- Objective 3.5.3.4: FTP Servers
- Objective 3.5.3.5: DNS Servers
- Objective 3.5.3.6: NNTP Servers
- Objective 3.5.3.7: File/Print Servers
- Objective 3.5.3.8: DHCP Servers
- Objective 3.5.3.9: Data Repositories
-
Quick Check Answer Key
-
Objective 3.1: Devices
- Objective 3.1.1: Firewalls
- Objective 3.1.2: Routers
- Objective 3.1.3: Switches
- Objective 3.1.4: Wireless
- Objective 3.1.5: Modems
- Objective 3.1.6: RAS
- Objective 3.1.7: Telecom/PBX
- Objective 3.1.8: VPN
- Objective 3.1.9: IDS
- Objective 3.1.10: Network Monitoring/Diagnostic
- Objective 3.1.11: Workstations
- Objective 3.1.12: Servers
- Objective 3.1.13: Mobile Devices
- Objective 3.2: Media
- Objective 3.3: Security Topologies
- Objective 3.4: Intrusion Detection
-
Objective 3.5: Security Baselines
- Objective 3.5.1: OS/NOS Hardening (Concepts and Processes)
- Objective 3.5.2: Network Hardening
-
Objective 3.5.3: Application Hardening
- Objective 3.5.3.1: Updates (Hotfixes, Service Packs, and Patches)
- Objective 3.5.3.2: Web Servers
- Objective 3.5.3.3: Email Servers
- Objective 3.5.3.4: FTP Servers
- Objective 3.5.3.5: DNS Servers
- Objective 3.5.3.6: NNTP Servers
- Objective 3.5.3.7: File/Print Servers
- Objective 3.5.3.8: DHCP Servers
- Objective 3.5.3.9: Data Repositories
-
Objective 3.1: Devices
-
Answers and Explanations
-
Objective 3.1: Devices
- Objective 3.1.1: Firewalls
- Objective 3.1.2: Routers
- Objective 3.1.3: Switches
- Objective 3.1.4: Wireless
- Objective 3.1.5: Modems
- Objective 3.1.6: RAS
- Objective 3.1.7: Telecom/PBX
- Objective 3.1.8: VPN
- Objective 3.1.9: IDS
- Objective 3.1.10: Network Monitoring/Diagnostic
- Objective 3.1.11: Workstations
- Objective 3.1.12: Servers
- Objective 3.1.13: Mobile Devices
- Objective 3.2: Media
- Objective 3.3: Security Topologies
- Objective 3.4: Intrusion Detection
-
Objective 3.5: Security Baselines
- Objective 3.5.1: OS/NOS Hardening (Concepts and Processes)
- Objective 3.5.2: Network Hardening
-
Objective 3.5.3: Application Hardening
- Objective 3.5.3.1: Updates (Hotfixes, Service Packs, and Patches)
- Objective 3.5.3.2: Web Servers
- Objective 3.5.3.3: Email Servers
- Objective 3.5.3.4: FTP Servers
- Objective 3.5.3.5: DNS Servers
- Objective 3.5.3.6: NNTP Servers
- Objective 3.5.3.7: File/Print Servers
- Objective 3.5.3.8: DHCP Servers
- Objective 3.5.3.9: Data Repositories
-
Objective 3.1: Devices
-
Objective 3.1: Devices
-
4. Basics of Cryptography
- Objective 4.1: Algorithms
- Objective 4.2: Concepts of Using Cryptography
- Objective 4.3: PKI
- Objective 4.4: Standards and Protocols
- Objective 4.5: Key Management/Certificate Lifecycle
-
Quick Check Answer Key
- Objective 4.1: Algorithms
- Objective 4.2: Concepts of Using Cryptography
- Objective 4.3: PKI
- Objective 4.4: Standards and Protocols
- Objective 4.5: Key Management/Certificate Lifecycle
-
Answers and Explanations
- Objective 4.1: Algorithms
- Objective 4.2: Concepts of Using Cryptography
- Objective 4.3: PKI
- Objective 4.4: Standards and Protocols
- Objective 4.5: Key Management/Certificate Lifecycle
-
5. Domain 5.0: Operational/Organizational Security
- Objective 5.1: Physical Security
- Objective 5.2: Disaster Recovery
- Objective 5.3: Business Continuity
-
Objective 5.4: Policy and Procedures
- Objective 5.4.1: Security Policy
- Objective 5.4.2: Incident Response Policy
- Objective 5.5: Privilege Management
- Objective 5.6: Forensics (Awareness, Conceptual Knowledge, and Understanding—Know What Your Role Is)
- Objective 5.7: Risk Identification
- Objective 5.8: Education—Training of End Users, Executives, and HR
- Objective 5.9: Documentation
-
Quick Check Answer Key
- Objective 5.1: Physical Security
- Objective 5.2: Disaster Recovery
- Objective 5.3: Business Continuity
-
Objective 5.4: Policy and Procedures
- Objective 5.4.1: Security Policy
- Objective 5.4.2: Incident Response Policy
- Objective 5.5: Privilege Management
- Objective 5.6: Forensics (Awareness, Conceptual Knowledge, and Understanding—Know What Your Role Is)
- Objective 5.7: Risk Identification
- Objective 5.8: Education—Training of End Users, Executives, and HR
- Objective 5.9: Documentation
-
Answers and Explanations
- Objective 5.1: Physical Security
- Objective 5.2: Disaster Recovery
- Objective 5.3: Business Continuity
-
Objective 5.4: Policy and Procedures
- Objective 5.4.1: Security Policy
- Objective 5.4.2: Incident Response Policy
- Objective 5.5: Privilege Management
- Objective 5.6: Forensics (Awareness, Conceptual Knowledge, and Understanding—Know What Your Role Is)
- Objective 5.7: Risk Identification
- Objective 5.8: Education—Training of End Users, Executives, and HR
- Objective 5.9: Documentation
- A. CD Contents and Installation Instructions
Product information
- Title: Security+ Practice Questions Exam Cram 2 (Exam SYO-101)
- Author(s):
- Release date: March 2004
- Publisher(s): Pearson IT Certification
- ISBN: 9780789731517
You might also like
book
CompTIA Security+ SY0-301 Practice Questions Exam Cram, Third Edition
This is the eBook version of the print title. Note that the eBook does not provide …
book
Security+® Practice Tests
Ace the CompTIA Security+ exam with over 700 practice exam questions written using the style and …
book
Plant Hazard Analysis and Safety Instrumentation Systems
Plant Hazard Analysis and Safety Instrumentation Systems is the first book to combine coverage of these …
book
IBM WebSphere V5.0 Security: WebSphere Handbook Series
This IBM Redbook provides IT Architects, IT Specialists, application designers, application developers, application assemblers, application deployers …