CompTIA Exam Prep - ITF+, A+, Network+, Security+, CySA+

This blog is here to help those preparing for CompTIA exams. This is designed to help the exam candidate to understand the concepts, rather than trust a brain dump. CHECK OUT THE BLOG INDEXES!!!

▼
Friday, October 12, 2018

Security Controls - Preventive

›
Preventive What you are trying to do is prevent some form of security breach/incident. Change management: Making sure that there or...
Thursday, October 11, 2018

RAID (Redundant Array of Independent Disks)

›
RAID (Redundant Array of Independent Disks) RAID 0: RAID 0 provides no fault tolerance or redundancy. Requires a minimum of...
Wednesday, August 15, 2018

WIRELESS AUTHENTICATION PROTOCOLS

›
EAP-TLS (Extensible Authentication Protocol-Transport Layer Security)  requires certificates to be installed on both the wireless clients an...

MALWARE TYPES - PART 3

›
Rootkits: Are programmed to provide continuous privileged access to a system. This malware remains hidden to avoid detection from an antivi...
Sunday, August 12, 2018

MALWARE TYPES - Part 2

›
Logic Bombs: A piece of code that is on a target PC/Sever until it is triggered by an event. That event can be a specific date or time, or ...

MALWARE TYPES - Part 1

›
Virus: This is malicious code that attaches to a host program/application. After a user initiates an action such as launching the applicati...
Saturday, August 11, 2018

LINUX CLI COMMANDS

›
Here are the Linux commands that you will need to know for the exam: cd: change directory - Allows a user to change between directories ...
‹
›
Home
View web version
Powered by Blogger.