CompTIA Exam Prep - ITF+, A+, Network+, Security+, CySA+

This blog is here to help those preparing for CompTIA exams. This is designed to help the exam candidate to understand the concepts, rather than trust a brain dump. CHECK OUT THE BLOG INDEXES!!!

▼
Wednesday, April 17, 2019

Kerberos

›
KERBEROS Kerberos is an authentication protocol Kerberos provides SSO (Single Sign-On) Uses Port 88 TCP or UDP KDC (Key Distributi...

AAA Services (Authentication, Authorization, and Accounting)

›
AAA Services RADIUS: Remote Authentication Dial-in User Service Port 1812 UDP for authentication Port 1813 TCP for accounting WPA Enterpr...
Friday, January 18, 2019

C - I - A: Confidentiality - Integrity - Availability

›
CIA  Confidentiality: Making certain information (data) is only viewable by certain people. 1. Encryption is the main method fo...
Friday, October 12, 2018

Security Controls - Preventive

›
Preventive What you are trying to do is prevent some form of security breach/incident. Change management: Making sure that there or...
Thursday, October 11, 2018

RAID (Redundant Array of Independent Disks)

›
RAID (Redundant Array of Independent Disks) RAID 0: RAID 0 provides no fault tolerance or redundancy. Requires a minimum of...
Wednesday, August 15, 2018

WIRELESS AUTHENTICATION PROTOCOLS

›
EAP-TLS (Extensible Authentication Protocol-Transport Layer Security)  requires certificates to be installed on both the wireless clients an...

MALWARE TYPES - PART 3

›
Rootkits: Are programmed to provide continuous privileged access to a system. This malware remains hidden to avoid detection from an antivi...
‹
›
Home
View web version
Powered by Blogger.