CompTIA Exam Prep - ITF+, A+, Network+, Security+, CySA+

This blog is here to help those preparing for CompTIA exams. This is designed to help the exam candidate to understand the concepts, rather than trust a brain dump. CHECK OUT THE BLOG INDEXES!!!

▼
Friday, January 18, 2019

C - I - A: Confidentiality - Integrity - Availability

›
CIA  Confidentiality: Making certain information (data) is only viewable by certain people. 1. Encryption is the main method fo...
Friday, October 12, 2018

Security Controls - Preventive

›
Preventive What you are trying to do is prevent some form of security breach/incident. Change management: Making sure that there or...
Thursday, October 11, 2018

RAID (Redundant Array of Independent Disks)

›
RAID (Redundant Array of Independent Disks) RAID 0: RAID 0 provides no fault tolerance or redundancy. Requires a minimum of...
Wednesday, August 15, 2018

WIRELESS AUTHENTICATION PROTOCOLS

›
EAP-TLS (Extensible Authentication Protocol-Transport Layer Security)  requires certificates to be installed on both the wireless clients an...

MALWARE TYPES - PART 3

›
Rootkits: Are programmed to provide continuous privileged access to a system. This malware remains hidden to avoid detection from an antivi...
Sunday, August 12, 2018

MALWARE TYPES - Part 2

›
Logic Bombs: A piece of code that is on a target PC/Sever until it is triggered by an event. That event can be a specific date or time, or ...

MALWARE TYPES - Part 1

›
Virus: This is malicious code that attaches to a host program/application. After a user initiates an action such as launching the applicati...
‹
›
Home
View web version
Powered by Blogger.