TAILIEUCHUNG - comptia security exam cram phần 2

Không có trách nhiệm cấp bằng sáng chế được giả định liên quan đến việc sử dụng các thông tin có trong tài liệu này. Mặc dù biện pháp phòng ngừa đã được thực hiện trong việc chuẩn bị của cuốn sách này, các nhà xuất bản và tác giả không chịu trách nhiệm cho các lỗi hoặc thiếu sót. | 9 Introduction TABLE I-1 Continued 1 Exam Topic Chapter Domain Assessments and Audits Use monitoring tools on systems and networks and detect security-related anomalies. 8 Compare and contrast various types of monitoring methodologies. 8 Execute proper logging procedures and evaluate the results. 8 Conduct periodic audits of system security settings. 8 Domain Cryptography Explain general cryptography concepts. 9 Explain basic hashing concepts and map various algorithms to appropriate applications. 9 Explain basic encryption concepts and map various algorithms to appropriate applications. 9 Explain and implement protocols. 10 Explain core concepts of public key cryptography. 10 Implement PKI and certificate management. 10 Domain Organizational Security Explain redundancy planning and its components. 11 Implement disaster recovery procedures. 11 Differentiate between and execute appropriate incident response procedures. 12 Identify and explain applicable legislation and organizational policies. 12 Explain the importance of environmental controls. 12 Explain the concept of and how to reduce the risks of social engineering. 12 Given all the book s elements and its specialized focus we ve tried to create a tool that will help you prepare for and pass CompTIA Security Exam SY0-201. Please share with us your feedback on this book especially if you have ideas about how we can improve it for future test takers. Send your questions or comments about this book via email to feedback@. We ll consider everything you say carefully and we ll respond to all suggestions. For more information about this book and other Exam Cram titles visit our website at http examcram. Thanks for making this Exam Cram book a pivotal part of your certification study plan. Best of luck on becoming certified CHAPTER THREE Infrastructure Basics Terms you need to understand TCP IP hijacking Spoofing Man-in-the-middle Replay DoS DNS kiting and DNS poisoning .

TỪ KHÓA LIÊN QUAN
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.