click below
click below
Normal Size Small Size show me how
Chapter 4 Essentials
Security+ SY0-501 7th Edition Exam Essentials (Chapter 4)
Question | Answer |
---|---|
Be able to describe the various tools. | Understand vulnerability scanners, port scanners, password crackers, and related tools. Know conceptually how they function. Be very familiar with command-line tools such as ipconfig, ping, and arp. |
Understand configuration issues. | Proper configuration of all security and network devices is essential and will be on the exam. You should also have a general idea of how to read and interpret output from security devices. |
Be able to describe the roles of access control. | The four primary roles are: (MAC) Mandatory access control (DAC) Discretionary access control (RBAC) Role-based access control (RBAC) Rule-based access control |
Explain the relative advantages of the technologies available to you for authentication. | You have many tools available to you to help establish authentication processes. Some of these tools start with a password and user ID. Others involve physical devices or the physical characteristics of the person who is requesting authentication. |
Understand least privilege. | Least privilege states that when assigning permissions, you should give users only the permissions they need to do their work and no more. The biggest benefit to following this policy is the reduction of risk. |