CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Rate it:
Open Preview
13%
Flag icon
vulnerability assessment attempts to discover current vulnerabilities or weaknesses.
13%
Flag icon
Penetration tests. These go a step further than a vulnerability assessment by attempting to exploit vulnerabilities.
13%
Flag icon
administrative controls are also known as operational or management controls.
13%
Flag icon
Awareness and training. The importance of training to reduce risks cannot be overstated.
13%
Flag icon
Configuration and change management. Configuration management often uses baselines to ensure that systems start in a secure, hardened state.
13%
Flag icon
Physical controls are any controls that you can physically touch.
14%
Flag icon
SP 800-53 Revision 4, “Security and
14%
Flag icon
http://csrc.nist.gov/publications/PubsSPs.html.
14%
Flag icon
Hardening. Hardening is the practice of making a system or application more secure than its default configuration.
14%
Flag icon
This includes disabling unnecessary ports and services,
14%
Flag icon
implementing secure protocols, using strong passwords along with a robust password policy, and disabling default and unnecessary accounts.
14%
Flag icon
Change management. Change management ensures that changes don’t result in unintended outages.
14%
Flag icon
Account disablement policy. An account disablement policy ensures that user accounts are disabled when an employee leaves.
14%
Flag icon
Detective controls attempt to detect when vulnerabilities have been exploited,
14%
Flag icon
Log monitoring. Several different logs record details of activity on systems and networks.
14%
Flag icon
Trend analysis. In addition to monitoring logs
14%
Flag icon
to detect any single incident,
14%
Flag icon
Security audit. Security audits can examine the security posture of an organization.
14%
Flag icon
Video surveillance. A closed-circuit television (CCTV) system can record activity and detect what occurred.
14%
Flag icon
Detective controls attempt to detect when vulnerabilities have been exploited.
14%
Flag icon
IPS. An intrusion prevention system (IPS) attempts to detect attacks and then modify the environment to block the attack from continuing.
14%
Flag icon
Compensating controls are alternative controls used instead of a primary control.
14%
Flag icon
Hypervisor. The software that creates, runs, and manages the VMs is the hypervisor.
14%
Flag icon
Host. The physical system hosting the VMs is the host.
14%
Flag icon
Guest. Operating systems running on the host system are guests or guest machines.
14%
Flag icon
Type I. Type I hypervisors run directly on the system hardware. They are often called bare-metal hypervisors because they don’t need to run within an operating system. For example, VMware has a family of ESX/ESXi products that are Type I hypervisors.
14%
Flag icon
Type II. Type II hypervisors run as software within a host operating system. For example, the Microsoft Hyper-V hypervisor runs within a Microsoft operating system.
14%
Flag icon
When implementing virtualization on a PC, you will use Type II hypervisor-based virtualization. However, virtualization in large-scale data centers typically uses Type I virtualization.
14%
Flag icon
Type I hypervisors run directly on bare-metal systems without an operating system.
14%
Flag icon
Type II hypervisors are software that run within an operating system.
15%
Flag icon
VM escape is an attack that allows an attacker to access the host system from within the virtual system.
15%
Flag icon
You will also find some basic commands that you can run through in the online labs at http://gcgapremium.com/501labs/.
15%
Flag icon
Ping is a basic command used to test connectivity for remote systems.
16%
Flag icon
ipconfig /all. This command shows a comprehensive listing of TCP/IP configuration information for each NIC. It includes the media access control (MAC) address,
16%
Flag icon
Normally, a NIC uses non-promiscuous mode and only processes packets addressed directly to its IP address. However, when you put it in promiscuous mode, it processes all packets regardless of the IP address. This allows the protocol analyzer to capture all packets that reach the NIC.
16%
Flag icon
Chapter 1 Exam
Tashfin Wahid
Look through this section.
« Prev 1 2 Next »