CompTIA Exam Prep - ITF+, A+, Network+, Security+, CySA+

This blog is here to help those preparing for CompTIA exams. This is designed to help the exam candidate to understand the concepts, rather than trust a brain dump. CHECK OUT THE BLOG INDEXES!!!

▼
Thursday, April 23, 2020

Mission Essential Functions / Critical Systems

›
CRITICAL SYSTEMS AND FUNCTIONS MTD (Maximum Tolerable Downtime)  is the longest period of a business outage without causing permanent b...
Wednesday, April 22, 2020

Media Sanitization Methods - Hard Drive / Paper

›
HARD DISKS If the goal is for the media never to be reused, there are three methods (for mechanical drives, not solid-state) 1. One method...
Monday, April 20, 2020

Identity and Authentication Factors

›
IDENTITY The first part of a login process is providing some form of identification, such as a username or email address .  AUTHEN...
Sunday, April 19, 2020

Certificates - PKI (Public Key Infrastructure)

›
Types of Certificates Self-signed: This type of certificate is owned by the server that signed it. They will be untrusted inside an orga...
Saturday, April 18, 2020

SSL/TLS Accelerator vs SSL Decryptor

›
SSL/TLS Accelerator An SSL/TLS Accelerator is normally a plug-in card on the web server, can also be included in a load balancing appli...

Hashing Algorithms: MD5, SHA, RIPEMD, & HMAC

›
HASHING Hashing is used to verify integrity, making sure the media has not been altered, changed, or modified by accidental or intentiona...
Friday, July 5, 2019

Bluetooth Attacks

›
Bluetooth Attack Types 1. Bluejacking The attacker sends an unsolicited message to a nearby device. The type of message can be ...
‹
›
Home
View web version
Powered by Blogger.