CompTIA Exam Prep - ITF+, A+, Network+, Security+, CySA+

This blog is here to help those preparing for CompTIA exams. This is designed to help the exam candidate to understand the concepts, rather than trust a brain dump. CHECK OUT THE BLOG INDEXES!!!

▼
Friday, July 5, 2019

Bluetooth Attacks

›
Bluetooth Attack Types 1. Bluejacking The attacker sends an unsolicited message to a nearby device. The type of message can be ...
Wednesday, April 17, 2019

Kerberos

›
KERBEROS Kerberos is an authentication protocol Kerberos provides SSO (Single Sign-On) Uses Port 88 TCP or UDP KDC (Key Distributi...

AAA Services (Authentication, Authorization, and Accounting)

›
AAA Services RADIUS: Remote Authentication Dial-in User Service Port 1812 UDP for authentication Port 1813 TCP for accounting WPA Enterpr...
Friday, January 18, 2019

C - I - A: Confidentiality - Integrity - Availability

›
CIA  Confidentiality: Making certain information (data) is only viewable by certain people. 1. Encryption is the main method fo...
Friday, October 12, 2018

Security Controls - Preventive

›
Preventive What you are trying to do is prevent some form of security breach/incident. Change management: Making sure that there or...
Thursday, October 11, 2018

RAID (Redundant Array of Independent Disks)

›
RAID (Redundant Array of Independent Disks) RAID 0: RAID 0 provides no fault tolerance or redundancy. Requires a minimum of...
Wednesday, August 15, 2018

WIRELESS AUTHENTICATION PROTOCOLS

›
EAP-TLS (Extensible Authentication Protocol-Transport Layer Security)  requires certificates to be installed on both the wireless clients an...
‹
›
Home
View web version
Powered by Blogger.