CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Rate it:
Open Preview
2%
Flag icon
gcgapremium.com/501-extras/,
Kyle Belote
website
13%
Flag icon
The first three control types in the list (technical, administrative, and physical) refer to how the security controls are implemented. The remaining control types refer to the goals of the security control.
14%
Flag icon
If you’re interested in pursuing other security-related certifications or making IT security a career, the SP 800 documents are well worth your time. You can download SP 800-53 Revision 4 and other SP 800 documents at http://csrc.nist.gov/publications/PubsSPs.html.
14%
Flag icon
Log monitoring. Several different logs record details of activity on systems and networks.
14%
Flag icon
Trend analysis. In addition to monitoring logs to detect any single incident, you can also monitor logs to detect trends.
14%
Flag icon
Security audit. Security audits can examine the security posture of an organization.
14%
Flag icon
Video surveillance. A closed-circuit television (CCTV) system can record activity and detect what occurred.
14%
Flag icon
Motion detection. Many alarm systems can detect motion from potential intruders and raise alarms.
14%
Flag icon
IPS. An intrusion prevention system
14%
Flag icon
Deterrent controls attempt to discourage a threat.
14%
Flag icon
Compensating controls are alternative controls used instead of a primary control. As an example, an organization might require employees to use smart cards when authenticating on   a system.
14%
Flag icon
Time-based One-Time Password (TOTP)
14%
Flag icon
Virtualization is a popular technology used within large data centers and can also be used on a regular personal computer (PC). It allows you to host one or more virtual systems,
14%
Flag icon
Hypervisor. The software that creates, runs, and manages the VMs is the hypervisor. Several virtualization technologies currently exist, including VMware products, Microsoft Hyper-V products, and Oracle VM VirtualBox.
14%
Flag icon
Host. The physical system hosting the VMs is the host. It requires more resources than a typical system, such as multiple processors, massive amounts of RAM, fast and abundant hard drive space, and one or more fast network cards.
14%
Flag icon
Guest. Operating systems running on the host system are guests or guest machines.
14%
Flag icon
Host elasticity and scalability. Elasticity and scalability refer to the ability to resize computing capacity based on the load.
14%
Flag icon
Application cell virtualization or container virtualization runs services or applications within isolated application cells (or containers).
14%
Flag icon
Remember this Type I hypervisors run directly on bare-metal systems without an operating system. Type II hypervisors are software that run within an operating system. Container virtualization runs within isolated cells or containers and does not have its own kernel.
14%
Flag icon
One   of the primary benefits is that VMs can provide segregation, segmentation, and isolation of individual systems.
14%
Flag icon
network interface card (NIC)
14%
Flag icon
A snapshot provides you with a copy of the VM at a moment in time, which you can use   as a backup.
14%
Flag icon
Remember this Virtualization allows multiple virtual servers to operate on a single physical server. It provides increased availability with lower operating costs. Additionally, virtualization provides a high level of flexibility when testing security controls, updates, and patches because they can easily be reverted using snapshots.
14%
Flag icon
(VDI) or virtual desktop environment (VDE), a user’s desktop operating system runs as a VM on a server. One benefit of using a VDI/VDE is that user PCs can have limited hardware resources.
15%
Flag icon
VM escape is an attack that allows an attacker to access the host system from within the virtual system.
15%
Flag icon
VM sprawl occurs when an organization has many VMs that aren’t managed properly.
16%
Flag icon
The ipconfig command (short for Internet Protocol configuration) shows the Transmission Control Protocol/Internet Protocol (TCP/IP) configuration information for a system.
16%
Flag icon
This includes items such as the computer’s IP address, subnet mask, default gateway, MAC address, and the address of a Domain Name System (DNS) server.
16%
Flag icon
Remember this Windows systems use ipconfig to view network interfaces. Linux systems use ifconfig, and ifconfig can also manipulate the settings on the network interfaces. You can enable promiscuous mode on a NIC with ifconfig. The ip command is similar to ifconfig and can be used to view and manipulate NIC settings.
16%
Flag icon
The netstat command (short for network statistics) allows you to view statistics for TCP/IP protocols on a system.
16%
Flag icon
The tracert command lists the routers between two systems. In this context, each router is referred to as a hop. Tracert identifies the IP address and sometimes the host name of each hop in addition to the round-trip times (RTTs) for each hop.
16%
Flag icon
Tracing a path is especially valuable when troubleshooting issues through a wide area network (WAN).
16%
Flag icon
Arp is a command-line tool that is related to the Address Resolution Protocol (ARP); however, arp (the command) and ARP (the protocol) are not the same thing.
16%
Flag icon
You can also use arp to identify the MAC address of other systems on your local network.
17%
Flag icon
The three primary security control types are technical (implemented with technology), administrative (using administrative or management methods), and physical (using controls that you can physically touch).
17%
Flag icon
B. Encrypt it before sending.
17%
Flag icon
B. Supporting integrity
17%
Flag icon
D.  To support obfuscation
17%
Flag icon
D.  Supporting non-repudiation
17%
Flag icon
C.  Ensure systems are not susceptible to unauthorized changes.
17%
Flag icon
B.  Cable locks
17%
Flag icon
D.  Most physical servers within the organization are currently underutilized.
17%
Flag icon
A.  Take a snapshot of the VM before deploying the new application.
17%
Flag icon
B.  ipconfig
17%
Flag icon
C.  VM sprawl
17%
Flag icon
Type I hypervisors
17%
Flag icon
C.  Non-persistence
17%
Flag icon
C.  Type II hypervisor virtualization
17%
Flag icon
D.  netstat
17%
Flag icon
D.  ping
« Prev 1 3 16