CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Rate it:
Open Preview
16%
Flag icon
tracert command lists the routers between two systems. In this context, each router is referred to as a hop. Tracert identifies the IP address and sometimes the host name of each hop in addition to the round-trip times (RTTs) for each hop.
16%
Flag icon
Windows-based systems use tracert and Linux-based systems use traceroute, but they both function similarly.
16%
Flag icon
Arp is a command-line tool that is related to the Address Resolution Protocol (ARP); however, arp (the command) and ARP (the protocol) are not the same thing.
16%
Flag icon
You can also use arp to identify the MAC address of other systems on your local network.
17%
Flag icon
B.         Encrypt it before sending.
17%
Flag icon
B.         Supporting integrity
17%
Flag icon
A.         To support steganography
17%
Flag icon
D. To support obfuscation
17%
Flag icon
D. Supporting non-repudiation
17%
Flag icon
C. Ensure systems are not susceptible to unauthorized changes.
17%
Flag icon
B. Cable locks
17%
Flag icon
A. Most physical servers within the organization are currently utilized at close to 100 percent.
17%
Flag icon
D. Most physical servers within the organization are currently underutilized.
17%
Flag icon
A. Take a snapshot of the VM before deploying the new application.
17%
Flag icon
A. ifconfig
17%
Flag icon
C. netstat
17%
Flag icon
C. VM sprawl
17%
Flag icon
D. Type II hypervisor
17%
Flag icon
A. VDE
17%
Flag icon
C. Non-persistence
17%
Flag icon
A. Container virtualization
17%
Flag icon
A. arp
17%
Flag icon
D. netstat
17%
Flag icon
D. ping
18%
Flag icon
identification occurs when users claim (or profess) their identity with identifiers such as usernames or email addresses.
18%
Flag icon
authentication, such as with a password.
18%
Flag icon
Marge knows her username and password, and an authenticating server knows her username and password. Marge presents her credentials to the authenticating server, and the server authenticates her.
18%
Flag icon
Services, processes, workstations, servers, and network devices all use authentication to prove their identities.
18%
Flag icon
Authentication, authorization, and accounting (AAA) work together with identification to provide a comprehensive access management system.
18%
Flag icon
authorization to access resources based on their proven identity. This can be as simple as granting a user permission to read data in a shared folder.
18%
Flag icon
Accounting methods track user activity and record the activity in logs.
18%
Flag icon
audit trail allows security professionals to re-create the events that preceded a security incident.
18%
Flag icon
something you know authentication factor typically refers to a shared secret, such as a password or even a PIN.
18%
Flag icon
Although this looks like a high number of possibilities, there are password-cracking tools that can test more than 20 billion passwords per second on desktop computers with a high-end graphics processor.
1 2 4 Next »