CompTIA Exam Prep - ITF+, A+, Network+, Security+, CySA+

This blog is here to help those preparing for CompTIA exams. This is designed to help the exam candidate to understand the concepts, rather than trust a brain dump. CHECK OUT THE BLOG INDEXES!!!

▼
Wednesday, August 15, 2018

WIRELESS AUTHENTICATION PROTOCOLS

›
EAP-TLS (Extensible Authentication Protocol-Transport Layer Security)  requires certificates to be installed on both the wireless clients an...

MALWARE TYPES - PART 3

›
Rootkits: Are programmed to provide continuous privileged access to a system. This malware remains hidden to avoid detection from an antivi...
Sunday, August 12, 2018

MALWARE TYPES - Part 2

›
Logic Bombs: A piece of code that is on a target PC/Sever until it is triggered by an event. That event can be a specific date or time, or ...

MALWARE TYPES - Part 1

›
Virus: This is malicious code that attaches to a host program/application. After a user initiates an action such as launching the applicati...
Saturday, August 11, 2018

LINUX CLI COMMANDS

›
Here are the Linux commands that you will need to know for the exam: cd: change directory - Allows a user to change between directories ...

LINUX PERMISSIONS

›
Linux permission attributes: r (read)                                                        View file content w (write)                ...

SYMMETRIC ENCRYPTION

›
Symmetric encryption uses the same key to encrypt and decrypt. Because this is a shared key, the keys have to be kept private. Symmetric Enc...
‹
›
Home
View web version
Powered by Blogger.