CompTIA Security+ Exam Notes

CompTIA Security+ Exam Notes
Let Us Help You Pass

Thursday, June 27, 2024

Target your search for products quickly

 Shortcut for searching for products on websites

Just use site:<domain name, such as homedepot.com> and what you are looking to find

Wednesday, June 26, 2024

Minimize & Maximize Multiple Windows

 Shortcuts to minimize & maximize multiple windows

Here are a few shortcuts to make you more efficient. 

Tuesday, June 25, 2024

Having trouble closing an app - Taskkill

 Close an app using Tasklist & Taskkill

We have all run into this at one time or another. You have an app that you cannot close via the app or with the Task Manager. Here is an easy way to do this without rebooting your system. 

Monday, June 24, 2024

Sunday, June 23, 2024

Sunday, May 5, 2024

Access Control Methods

 ABAC, DAC, MAC, Role-BAC, Rule-BAC

ABAC (Attribute-Based Access Control)
The most fine-grained access control.
Access is based on a combination of subject and object attributes
  • Operating system
  • IP address
  • Up-to-date patches
  • Up-to-date antimalware
  • Employee's identity
  • Time of day
  • Location
  • Type of device
DAC (Discretionary Access Control)
  • Based on the owner of the file or folder
  • The owner decides who gets access and the type of access
  • Windows, Linux, and UNIX use a DAC method
MAC (Mandatory Access Control)
  • Each object is assigned a classification label
  • Each subject is assigned a clearance level (such as Confidential, Secret, or Top Secret)
  • A subject with the label "Secret" would be unable to access "Top Secret" data as it would be above its clearance level.
  • Also, based on "Need to know," in other words, not everything will they have access to at its security level. 
RBAC (Role-Based Access Control)
  • Based on your job function (role)
  • Group-based security
  • Group examples: Accounting, HR, IT, Sales. etc
RBAC (Rule-Based Access Control)
  • System enforced rules
  • Some rule triggers the access control
  • Time of day 
  • Conditional access is a form of rule-based access control
  • UAC (User Account Control - Windows) and sudo - Linux are examples of conditional access

Wednesday, May 1, 2024

Netstat - Native to Linux / Windows

 NETSTAT


Netstat is a tool built into both Linux and Windows, but the syntax is different between the two operating systems.

Several ways this local command line tool can be utilized:
  • See what ports (services) are in a listening state, both TCP and UDP ports.
  • See what files are being accessed and which computers are involved.
  • See if any systems are connected before rebooting a server.
  • See what process established the connection (such as Zoom, Firefox, Chrome, Edge, etc.)
  • Display ethernet statistics
  • Display the owning process ID
  • Display the routing table