Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 3. Infrastructure and Connectivity

Chapter 3. Infrastructure and Connectivity

THE FOLLOWING COMPTIA SECURITY+ EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER:

  • 1.2 Explain the security risks pertaining to system hardware and peripherals.

    • Removable storage

    • Network attached storage

  • 1.4 Carry out the appropriate procedures to establish application security.

    • ActiveX

    • Java

    • Scripting

    • Browser

    • Buffer overflows

    • Cookies

    • SMTP open relays

    • P2P

    • Input validation

    • Cross-site scripting (XXS)

  • 1.5 Implement security applications.

    • Popup blockers

  • 2.3 Determine the appropriate use of network security tools to facilitate network security.

    • Proxy servers

  • 2.4 Apply the appropriate network tools to facilitate network security.

    • Proxy servers

  • 2.5 Explain the vulnerabilities and mitigations associated with network devices.

    • Default accounts

  • 2.6 Explain the vulnerabilities and mitigations associated with various transmission media.

    • Vampire taps

  • 3.7 Deploy various authentication models and identify the components of each.

    • RADIUS

    • RAS

    • Remote access policies

    • Remote authentication

    • VPN

    • 802.1x

    • TACACS


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free 10-Day Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint