Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 11: Security and Vulnerability in the Network

Chapter 11

Security and Vulnerability in the Network

The Following CompTIA Security+ Exam Objectives Are Covered in This Chapter:

  • 1.2 Apply and implement secure network administration principles.
    • Rule-based management
    • Port security
    • 802.1X
    • Flood guards
    • Loop protection
    • Prevent network bridging by network separation
    • Log analysis
  • 3.6 Analyze and differentiate among types of mitigation and deterrent techniques.
    • Manual bypassing of electronic controls: Failsafe/secure vs. failopen
    • Monitoring system logs: Event logs; Audit logs; Security logs; Access logs
    • Port security: MAC limiting and filtering; 802.1X; Disabling unused ports
    • Security posture: Initial baseline configuration; Continuous security monitoring; remediation
    • Reporting: Alarms; Alerts; Trends
    • Detection controls vs. prevention controls: Camera vs. guard

  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint