CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Rate it:
Open Preview
23%
Flag icon
Remember this Rule-based access control is based on a set of approved instructions, such as an access control list. Some rule-BAC systems use rules that trigger in response to an event, such as modifying ACLs after detecting an attack or granting additional permissions to a user in certain situations.
23%
Flag icon
discretionary access control (DAC) model,
23%
Flag icon
New Technology File System (NTFS)
23%
Flag icon
security identifiers (SIDs),
23%
Flag icon
discretionary access control list (DACL)
23%
Flag icon
Access Control Entries (ACEs).
23%
Flag icon
Remember this The DAC model specifies that every object has an owner, and the owner has full, explicit control of the object. Microsoft NTFS uses the DAC model.
23%
Flag icon
mandatory access control (MAC)
23%
Flag icon
Remember this The MAC model uses sensitivity labels for users and data. It is commonly used when access needs to be restricted based on a need to know. Sensitivity labels often reflect classification levels of data and clearances granted to individuals.
23%
Flag icon
attribute-based access control (ABAC) evaluates attributes and grants access based on the value of these attributes.
23%
Flag icon
Remember this The ABAC model uses attributes defined in policies to grant access to resources. It’s commonly used in software defined networks (SDNs).
24%
Flag icon
D.
24%
Flag icon
A.
24%
Flag icon
B.
24%
Flag icon
C.
24%
Flag icon
B.
24%
Flag icon
C.
24%
Flag icon
A.
24%
Flag icon
D.
24%
Flag icon
D.
24%
Flag icon
C.
24%
Flag icon
C.
24%
Flag icon
C.
24%
Flag icon
D.
24%
Flag icon
C.  Role-BAC
24%
Flag icon
D.
25%
Flag icon
DDoS. A denial-of-service (DoS)
25%
Flag icon
A distributed DoS (DDoS) attack includes multiple computers attacking a single target.
25%
Flag icon
Transmission Control Protocol/Internet Protocol (TCP/   IP)
25%
Flag icon
Hypertext Transfer Protocol (HTTP) and Simple Mail Transfer Protocol (SMTP), support
25%
Flag icon
HTTP is 80
25%
Flag icon
Transmission Control Protocol (TCP) provides connection-oriented traffic (guaranteed delivery).
25%
Flag icon
User Datagram Protocol (UDP)
25%
Flag icon
IPv4 uses 32-bit addresses represented in dotted decimal format, such as 192.168.1.100. IPv6 uses 128-bit addresses using hexadecimal code, such as FE80:0000:0000:0000:20D4:3FF7:003F:DE62.
25%
Flag icon
ICMP. Internet Control Message Protocol (ICMP) is used for testing basic connectivity and includes tools such as ping, pathping, and tracert.
25%
Flag icon
ARP. Address Resolution Protocol (ARP) resolves IPv4 addresses to media access control (MAC) addresses.
25%
Flag icon
The Real-time Transport Protocol (RTP)
25%
Flag icon
Voice over Internet Protocol (VoIP) communications, streaming media, video teleconferencing applications, and devices using web-based push-to-talk features.
25%
Flag icon
Secure Real-time Transport Protocol (SRTP) provides encryption, message authentication, and integrity for RTP.
26%
Flag icon
FTP. File Transfer Protocol (FTP)
26%
Flag icon
FTP active mode uses TCP port 21 for control signals and TCP port 20 for data.
26%
Flag icon
Trivial File Transfer Protocol (TFTP) uses UDP port 69 and is used
26%
Flag icon
Secure Shell (SSH) encrypts traffic in transit and can be used to encrypt other protocols such as FTP.
26%
Flag icon
The Secure Sockets Layer (SSL) protocol was the primary method used to secure HTTP traffic as Hypertext Transfer Protocol Secure (HTTPS).
26%
Flag icon
TLS. The Transport Layer Security (TLS) protocol is the designated replacement for SSL and should be used instead of SSL.
26%
Flag icon
IPsec. Internet Protocol security (IPsec) is used to encrypt IP traffic. It is native to IPv6 but also works with IPv4.
26%
Flag icon
SFTP. Secure File Transfer Protocol (SFTP) is a secure implementation of FTP.
26%
Flag icon
SFTP transmits data using TCP port 22.
26%
Flag icon
Remember this Secure Shell (SSH) encrypts traffic over TCP port 22. Transport Layer Security (TLS) is a replacement for SSL and is used to encrypt many different protocols. Secure FTP (SFTP) uses SSH to encrypt traffic. FTP Secure (FTPS) uses TLS to encrypt traffic.
26%
Flag icon
National Institute of Standards and Technology (NIST)