CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Rate it:
Open Preview
14%
Flag icon
Detective controls attempt to detect when vulnerabilities have been exploited, resulting in a security incident.
14%
Flag icon
monitoring. Several different logs record details of activity on systems and networks.
14%
Flag icon
Trend analysis. In addition to monitoring logs to detect any single incident, you can also monitor logs to detect trends.
14%
Flag icon
Security audit. Security audits can examine the security posture of an organization.
14%
Flag icon
Video surveillance. A closed-circuit television (CCTV) system can record activity and detect what occurred.
14%
Flag icon
Motion detection. Many alarm systems can detect motion from potential intruders and raise alarms. Remember this
14%
Flag icon
A detective control can’t predict when an incident will occur and it can’t prevent it. In contrast, prevention controls stop the incident from occurring at all.
14%
Flag icon
Corrective controls attempt to reverse the impact of an incident or problem after it has occurred.
14%
Flag icon
IPS. An intrusion prevention system (IPS) attempts to detect attacks and then modify the environment to block the attack from continuing.
14%
Flag icon
Backups and system recovery. Backups ensure that personnel can recover data if it is lost or corrupted.
14%
Flag icon
Deterrent controls attempt to discourage a threat.
14%
Flag icon
Cable locks. Securing laptops to furniture with a cable lock deters thieves from stealing the laptops.
14%
Flag icon
Hardware locks. Other locks such as locked doors securing a wiring closet or a server room also deter attacks.
14%
Flag icon
Compensating controls are alternative controls used instead of a primary control.
14%
Flag icon
As an example, an organization might require employees to use smart cards when authenticating on   a system.
14%
Flag icon
Time-based One-Time Password (TOTP)
14%
Flag icon
Virtualization is a popular technology used within large data
14%
Flag icon
centers and can also be used on a regular personal computer (PC).
14%
Flag icon
Hypervisor. The software that creates, runs, and manages the VMs is the hypervisor.
14%
Flag icon
Host. The physical system hosting the VMs is the host.
14%
Flag icon
Guest. Operating systems running on the host system are guests or guest machines.
14%
Flag icon
Host elasticity and scalability. Elasticity and scalability refer to the ability to resize computing capacity based on the load.
14%
Flag icon
Virtualization typically provides the best return on investment (ROI) when an organization has many underutilized servers.
14%
Flag icon
You could convert three physical servers to virtual hosts and run three guest servers on each physical server. Assuming all the servers are similar, this wouldn’t cost any more money for the physical servers.
14%
Flag icon
Type I. Type I hypervisors run directly on the system hardware.
14%
Flag icon
Type II. Type II hypervisors run as software within a host operating system.
14%
Flag icon
One way of doing so is to disable the network interface card (NIC) in the VM. This prevents it from transmitting any data in or out of the VM.
14%
Flag icon
snapshot provides you with a copy of the VM at a moment in time, which you can use   as a backup.
14%
Flag icon
Risky operations include applying patches or updates, testing security controls, and installing new applications.
14%
Flag icon
By creating snapshots before these operations, administrators can easily revert or roll back the system to a known good state with a known good configuration.
14%
Flag icon
Additionally, virtualization provides a high level of flexibility when testing security controls, updates, and patches because they can easily be reverted using snapshots.
14%
Flag icon
In a persistent virtual desktop, each user has a custom desktop image.
14%
Flag icon
Virtual desktops that support non-persistence serve the same desktop for all users.
14%
Flag icon
Although users can make changes to the desktop as they’re using it, it reverts to a known state (the original snapshot) when they log off.
14%
Flag icon
Many people consider virtual machine escape (VM escape) to be the most serious threat to virtual system security. Loss of confidentiality and loss of availability can also be a concern.
14%
Flag icon
VM escape is an attack that allows an attacker to access the host system from within the virtual system.
14%
Flag icon
the attacker can run code on the virtual system and interact with the hypervisor.
14%
Flag icon
A successful VM escape attack often gives the attacker unlimited control over the host system and each virtual system within the host.
14%
Flag icon
VM sprawl occurs when an organization has many VMs that aren’t managed properly.
15%
Flag icon
Another challenge with VM sprawl is that each VM adds additional load onto a server.
15%
Flag icon
Although this makes it easy to manage and move virtual machines, it also makes them easy to steal.
15%
Flag icon
For example, a virtual machine can include a database with credit card data, company financial records, or any type of proprietary data.
15%
Flag icon
Ping is a basic command used to test connectivity for remote systems.
15%
Flag icon
The ping command checks connectivity by sending Internet Control Message Protocol (ICMP) echo request packets. Remote systems answer with ICMP echo reply packets and if you receive echo replies, you
15%
Flag icon
Some malware attempts to break the name resolution process for specific hosts. For example, Windows systems get updates from a Windows Update server. In some cases, malware changes the name resolution process to prevent systems from reaching the Windows Update server and getting updates.
15%
Flag icon
Administrators use ping to check connectivity of remote systems and verify name resolution is working. They also use ping to check the security posture of systems and networks by verifying that routers, firewalls, and IPSs block ICMP traffic when configured to do
15%
Flag icon
ipconfig command (short for Internet Protocol configuration) shows the Transmission Control Protocol/Internet Protocol (TCP/IP) configuration information for a system.
15%
Flag icon
Linux-based systems use ifconfig (short for interface configuration) instead of ipconfig.
15%
Flag icon
benefit is that ifconfig has more capabilities than ipconfig, allowing you to use it to configure the NIC in addition to listing the properties of the NIC. The following list shows some common commands:
16%
Flag icon
netstat command (short for network statistics) allows you to view statistics for TCP/IP protocols on a system. It also gives you the ability to view active TCP/IP network connections.