CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Rate it:
Open Preview
19%
Flag icon
Here’s a list of some of the passwords in the top 10 list that users had created for their accounts: 123456, 12345, password, DEFAULT, 123456789, qwerty, 12345678, abc123, and 1234567. Over 120,000 users had 123456 as their password.
19%
Flag icon
Before resetting passwords for users, it’s important to verify the user’s identity. When resetting passwords manually, it’s best to create a temporary password that expires upon first use.
19%
Flag icon
Windows domains use Group Policy to manage multiple users and computers in a domain.
19%
Flag icon
Active Directory Domain Services (AD DS) is a directory service Microsoft developed for Windows domain networks.
19%
Flag icon
Smart cards are credit card-sized cards that have an embedded microchip and a certificate.
19%
Flag icon
they are digital files that support cryptography for increased security.
20%
Flag icon
HOTP creates a one-time use password that does not expire until it is used. TOTP creates a one-time password that expires after 30 seconds. Both can be used as software tokens for authentication.
20%
Flag icon
Biometric methods are the strongest form of authentication
20%
Flag icon
passwords are the weakest form of authentication.
20%
Flag icon
occur. By increasing the sensitivity, it decreases the number of false matches and increases the number of false rejections. In contrast, decreasing the sensitivity increases the false matches and decreases the false rejections.
20%
Flag icon
It’s worth noting that using two methods of authentication in the same factor is not dual- factor authentication. For example, requiring users to enter a password and a PIN (both in the something you know factor) is single-factor authentication, not dual-factor authentication.
20%
Flag icon
A common goal they have is to ensure that unencrypted credentials are not sent across a network.
20%
Flag icon
Kerberos provides mutual authentication that can help prevent man-in-the- middle attacks and uses tickets to help prevent replay attacks.
21%
Flag icon
Additionally, Kerberos uses symmetric-key cryptography to prevent unauthorized disclosure and to ensure confidentiality.
21%
Flag icon
SSO increases security because the user only needs to remember one set of credentials and is less likely to write them down.
21%
Flag icon
SSO requires strong authentication to be effective.
21%
Flag icon
(SAML) is an Extensible Markup Language (XML)– based data format used for SSO on web browsers.
21%
Flag icon
SAML is an XML-based standard used to exchange authentication and authorization information between different parties. SAML provides SSO for web-based applications.
21%
Flag icon
A federation requires a federated identity management system that all members of the federation use.
21%
Flag icon
Privileges are the rights and permissions assigned to authorized users.
21%
Flag icon
A primary goal of implementing least privilege is to reduce risks.
21%
Flag icon
job. Notice that need to know is focused on data and information, which is typically protected with permissions. In contrast, the principle of least privilege includes both rights and permissions.
22%
Flag icon
Note that having a single, temporary user log on with the Guest account does support identification, authentication, authorization, and accounting. It is only when multiple users are sharing the same account that you lose these controls.
22%
Flag icon
Remember this Requiring administrators to use two accounts, one with administrator privileges and another with regular user privileges, helps prevent privilege escalation attacks. Users should not use shared accounts.
22%
Flag icon
Disabling the account ensures that data associated with it remains available. Security keys associated with an account remain available when the account is disabled, but are no longer accessible if the account is deleted.
22%
Flag icon
It’s also possible to identify a set of IP addresses as the only addresses that are acceptable. This is often referred to as whitelisting the IP addresses.
22%
Flag icon
Credential management systems help users store these credentials securely. The goal is to simplify credential management for users, while also ensuring that unauthorized personnel do not have access to the users’ credentials.
22%
Flag icon
The access control helps determine how a system grants authorization to objects.
22%
Flag icon
Without groups, you would use user-assigned privileges.
22%
Flag icon
Group-based privileges reduce the administrative workload of access management. Administrators put user accounts into security groups, and assign privileges to the groups. Users within a group automatically inherit
22%
Flag icon
the privileges assigned to the group.
23%
Flag icon
The DAC model is significantly more flexible than the MAC model described in the next section. MAC has predefined access privileges, and the administrator is required to make the changes.
23%
Flag icon
Trojan horses are executable files. They masquerade as something useful, but they include malware.
23%
Flag icon
The mandatory access control (MAC) model uses labels (sometimes referred to as sensitivity labels or security labels) to determine access.
23%
Flag icon
Military units make wide use of this model to protect data.
23%
Flag icon
Security-enhanced Linux (SELinux) is one of the few operating systems using the mandatory access control model.
23%
Flag icon
An administrator is responsible for establishing access, but only someone at a higher authority can define
23%
Flag icon
Multiple approval levels are usually involved in the decision-making process to determine what a user can access.
25%
Flag icon
The current objectives have deemphasized the importance of ports. However, you still need to know them when implementing access control lists (ACLs) in routers and stateless firewalls, and when disabling unnecessary ports and services. With that in mind, I’ve included the well- known ports for many of the protocols in this chapter.
25%
Flag icon
TCP/ IP uses the IP address to get a packet to a destination network, but once it arrives on the destination network, it uses the MAC address to get it to the correct host.
25%
Flag icon
UDP is commonly used instead of
25%
Flag icon
TCP as the underlying protocol with voice and video streaming.
25%
Flag icon
The Real-time Transport Protocol (RTP) delivers audio and video over IP networks.
25%
Flag icon
The Secure Real-time Transport Protocol (SRTP) provides encryption, message authentication, and integrity for RTP.
26%
Flag icon
Transfer Protocol (FTP) uploads and downloads large files to and from an FTP server.
26%
Flag icon
•     TFTP. Trivial File Transfer Protocol (TFTP) uses UDP port 69 and is used to transfer smaller amounts of data, such as when communicating with network devices.
26%
Flag icon
SSH. Secure Shell (SSH) encrypts traffic in transit and can be used to encrypt other protocols such
26%
Flag icon
as FTP.
26%
Flag icon
The Secure Sockets Layer (SSL) protocol was the primary method used to secure HTTP traffic as Hypertext Transfer Protocol Secure (HTTPS).
26%
Flag icon
The Transport Layer Security (TLS) protocol is the designated replacement for SSL and should be used instead of SSL.