SØG - mellem flere end 8 millioner bøger:
Viser: CompTIA Security+ SY0-701 Exam Cram
CompTIA Security+ SY0-701 Exam Cram
Robert Shimonski og Martin Weiss
(2024)
Sprog: Engelsk
om ca. 15 hverdage
Detaljer om varen
- 7. Udgave
- Paperback: 688 sider
- Udgiver: Cisco Press (September 2024)
- Forfattere: Robert Shimonski og Martin Weiss
- ISBN: 9780138225575
CompTIA Security+ SY0-701 Exam Cram is an all-inclusive study guide designed to help you pass the updated version of the CompTIA Security+ exam. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review Cram Sheet. The powerful Pearson Test Prep practice software provides real-time assessment and feedback with two complete exams.
This edition comes with a Pearson Test Prep Practice Test access code that is delivered upon product registration. Follow the instructions in the book's introduction to register your product.
Covers the critical information needed to score higher on your Security+ SY0-701 exam!
- General security concepts
- Threats, vulnerabilities, and mitigations
- Security architecture
- Security operations
- Security program management and oversight
Prepare for your exam with Pearson Test Prep
- Realistic practice questions and answers
- Comprehensive reporting and feedback
- Customized testing in study, practice exam, or flash card modes
- Complete coverage of CompTIA Security+ SY0-701 exam objectives
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. xxvi
Part 1: General Security Concepts 1
CHAPTER 1: Security Controls..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 3 Nature of Controls..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 3 Functional Use of Controls..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 4 What Next?..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 9
CHAPTER 2: Fundamental Security Concepts..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 11 Confidentiality, Integrity, and Availability (CIA)..
.
.
.
.
.
.
.
. 12 Non-Repudiation..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 13 Authentication, Authorization, and Accounting (AAA)..
.
.
.
.
.
. 13 Gap Analysis.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 14 Zero Trust..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 15 Physical Security.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 18 Video Surveillance.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 20 Deception and Disruption Technology.
.
.
.
.
.
.
.
.
.
.
. 23 What Next?..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 26
CHAPTER 3: Change Management Processes and the Impact to Security..
.
.
.
. 27 Change Management.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 28 Business Processes Impacting Security Operations.
.
.
.
.
.
.
. 28 Technical Implications..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 31 Documentation.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 35 Version Control..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 36 What Next?..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 38
CHAPTER 4: Cryptographic Solutions.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 39 Public Key Infrastructure (PKI)..
.
.
.
.
.
.
.
.
.
.
.
.
. 40 Encryption.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 43 Tools..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 55 What Next?..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 80
Part 2: Threats, Vulnerabilities, and Mitigations 81
CHAPTER 5: Threat Actors and Motivations..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 83 Threat Actors..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 84 Motivations..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 90 What Next?..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 96
CHAPTER 6: Threat Vectors and Attack Surfaces..
.
.
.
.
.
.
.
.
.
.
. 97 Types of Threat Vectors and Attack Surfaces.
.
.
.
.
.
.
.
.
. 98 What Next?..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 114
CHAPTER 7: Vulnerability Types..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.. 115 Application.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 116 Operating System-Based..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 118 Web-Based.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 119 Hardware.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 120 Virtualization..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 121 Cloud-Specific..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 122 Supply Chain..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 123 Cryptographic..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 125 Misconfiguration.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 126 Mobile Device..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 127 Zero-Day.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 127 What Next?..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 130
CHAPTER 8: Malicious Attacks and Indicators..
.
.
.
.
.
.
.
..
.
.
.
. 131 Malware Attacks..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 132 Physical Attacks..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 138 Network Attacks..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 139 Application Attacks..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 148 Cryptographic Attacks..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 153 Password Attacks.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 154 Indicators of Malicious Activity.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 156 What Next?..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 160
CHAPTER 9 Mitigation Techniques for Securing the Enterprise..
.
.
.
. 161 Segmentation..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 162 Access Control..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 162 Application Allow List..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 164 Isolation.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 165 Patching..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 165 What Next?..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 176
Part 3: Security Architecture 177
CHAPTER 10: Security Implications of Architecture Models.
.
.
.
.
.
.
. 179 Architecture and Infrastructure Concepts.
.
.
.
.
.
.
.
.
.
. 180 Considerations..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 201 What Next?..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 209
CHAPTER 11: Enterprise Architecture Security Principles..
.
.
.
.
.
.
.
. 211 &n