Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CompTia Security+ Test 1, Exams of Computer Science

CompTia Security+ Test 1 CompTia Security+ Test 1

Typology: Exams

2021/2022

Available from 10/14/2022

PaperPass
PaperPass 🇺🇸

173 documents

1 / 2

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
CompTia Security+ Test 1
Firewall - Software that checks information coming from the internet and depending on the applied
configuration settings, either block it or allows it to pass through
Router - Device Designed to forward data packets between networks
Exception - Allowing a program through a firewall
Load Balancer - A technique or network device used to distribute workload evenly across two or more
routers, in order to get optimal resource utilization, maximize throughput, minimize response time, and
avoid overload.
Default rule of firewall - Deny all traffic
Proxy - Computer network service that allows clients to make indirect network connections to other
network services.
MAC filtering - Solution designed to filtering malicious / restricted content from entering corporate
networks
Tunneling - Type of protocols that ensure the privacy of a VPN connection
VPN concentrator - Dedicated device for managing secure connections established over an untrusted
network
Intrusion Detection System - Network or host based monitoring system designed to automatically alert
administrators of known or suspected unauthorized activity.
Packet Sniffer - Software tool used to monitor and examine contents of network traffic
pf2

Partial preview of the text

Download CompTia Security+ Test 1 and more Exams Computer Science in PDF only on Docsity!

CompTia Security+ Test 1

Firewall - Software that checks information coming from the internet and depending on the applied configuration settings, either block it or allows it to pass through Router - Device Designed to forward data packets between networks Exception - Allowing a program through a firewall Load Balancer - A technique or network device used to distribute workload evenly across two or more routers, in order to get optimal resource utilization, maximize throughput, minimize response time, and avoid overload. Default rule of firewall - Deny all traffic Proxy - Computer network service that allows clients to make indirect network connections to other network services. MAC filtering - Solution designed to filtering malicious / restricted content from entering corporate networks Tunneling - Type of protocols that ensure the privacy of a VPN connection VPN concentrator - Dedicated device for managing secure connections established over an untrusted network Intrusion Detection System - Network or host based monitoring system designed to automatically alert administrators of known or suspected unauthorized activity. Packet Sniffer - Software tool used to monitor and examine contents of network traffic

Simple Mail Transfer Protocol - Protocol and port number used by a spam filter Unified Threat Management - Network Security Solution Combining the Functionality of a firewall with additional safeguards, such as URL filtering, content inspection, or malware inspection Network Intrusion Prevention System - Network security solution that inspects network traffic in real- time, has the capability to stop ongoing attack Web Application Firewall - Firewall controlling access to a web server Access Control List - Set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object 802.1x - A IEEE standard designed to define port-based network access control as well as enhance security of wireless networks by authenticating a user to a central authority. Rule-Based - Type of access Control model; access to resources granted or denied depending on Access Control List (ACL) entries Anomaly-based - Type of IDS that relies on previously established baseline of normal network activity in order to detect intrusions Flood Guard - A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack. Provides a countermeasure aginst denial-of-service attack characterized by increasing number of half- open connections. Hash-based Message Authentication Code - Protocol taht protect against switching loops Signature based - Type of Intrusion Detection System (IDS) that relies on known attack patterns to detect an intrusion