Preview

Comptia Security+ (Exam Sy0-301)

Good Essays
Open Document
Open Document
5718 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Comptia Security+ (Exam Sy0-301)
CompTIA Security+ (Exam SY0-301)

quick reference sheet
Table of Contents
..............................................................................
Fundamentals.............................................................................Page 1
Threats and Vulnerabilities.....................................................Page 1
Network Security.......................................................................Page 3
Application, Data, and Host Security...................................Page 4
Access Control and Authentication Services.....................Page 5
Cryptography Basics................................................................Page 5
Compliance and Operational Security.................................Page 6
Risk Management.....................................................................Page 7
Managing Security Incidents..................................................Page 8
Business Continuity and Disaster Recovery Planning......Page 8

Fundamentals
Information Security

Information security refers to the protection of available information or information resources from unauthorized access, attacks, thefts, or data damage. The three primary goals of information security are prevention, detection, and recovery.

Confidentiality

The CIA Triad

Integrity

Availability

Principle

Description

Confidentiality

The fundamental principle of keeping information and communications private and protecting them from unauthorized access.

Integrity

The property of keeping information accurate, free of errors, and without unauthorized modifications.

Availability

The fundamental principle of ensuring that systems operate continuously and that authorized persons can access the data that they need.

Vulnerabilities, Threats and Attacks

A vulnerability is any condition that leaves a system open to attack, and a threat is any event or action that could potentially result in a

violation of a

You May Also Find These Documents Helpful

  • Good Essays

    SAMPLE EXAM 3 2010

    • 3549 Words
    • 16 Pages

    1. Which of the following statements about the payment of defense costs by the PAP is (are) true?…

    • 3549 Words
    • 16 Pages
    Good Essays
  • Good Essays

    Global Limited is a global provider of infrastructure information systems, whose services cater to a wide range of industry sectors. One of Global Limited’s business objectives is information security for their clients. In order to provide their clients with information security, Global Limited has utilized a risk management approach to protect their client’s information.…

    • 515 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    SP15 Exam3Rev

    • 408 Words
    • 2 Pages

    8. (1/2 point for correctly identifying each school, rounded up; 2 points each for the details) Provide details on each of the four schools of thought…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    cis202 exam review

    • 613 Words
    • 3 Pages

    1- You are implementing a network. Using the Cisco hierarchal model, which layer would address the configuration of routers closest to the users?…

    • 613 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Mus 250 Exam1

    • 4190 Words
    • 17 Pages

    | Today people hear so much music that they tend not to listen carefully to it.…

    • 4190 Words
    • 17 Pages
    Satisfactory Essays
  • Satisfactory Essays

    There are many threats to an organization, these include internal and external; virtual and physical threats. All of which can be tackled in some manner. Some are easier address then others.…

    • 521 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    C200 Exam

    • 1410 Words
    • 6 Pages

    1. In President Obama’s speech at West Point, he announced that 30,000 additional troops would be sent to Afghanistan. He made this decision because he said it was vital to the United States’ national interest. The vital national interest at risk in President Obama’s address is the security and safety of the American people as well as the “security of our allies and the common security of the world.” By involving the military and increasing the troop strength, President Obama can achieve the objectives of his strategy. His objectives are to keep the Taliban from becoming powerful, prevent them from government rule, improve Afghanistan security forces and government so they can manage their own country and prevent Al Qaeda from establishing refuge in other countries. If you follow the framework of several important U.S. documents, such as the National Defense Strategy (NDS) and Quadrennial Defense Review (QDR) they will outline this same strategy. The National Defense Strategy states that it is the responsibility of the military to protect ourselves and our allies from attack. It states that the military should help protect and secure our vital interests abroad. U.S. security is linked with the security of the international community. The physical integrity of our country is protected by the military through multiple security controls. One of these security controls is through deployments of the armed forces. The Quadrennial Defense Review states the mission of the U.S. military is to protect the American people and advance our nation’s interests. The vital interests of the United States are intertwined with the integrity and resilience of allies abroad. Our vital interests are security, prosperity, broad respect for universal values and an international order that promotes cooperation among our allies. The President’s vision is to become more powerful domestically while bringing together all elements of national power. We need to help our neighbors…

    • 1410 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    This is an example of the final exam paper for PHY3171. It is very similar in format to the real paper for 2009. Some questions are from past papers, some are on this years and some I’ll use in the future. ________________________________________________________________________ SECTION ONE: LONG ANSWER QUESTION (Suggested time: 60 minutes) Answer the following TWO (2) questions (questions 1 and 2). Answer each question in a SEPARATE answer booklet.…

    • 855 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Outcome 1: Know about the legislation, guidelines, policies and procedures for safeguarding the welfare of children and young people, including e-safety…

    • 4077 Words
    • 17 Pages
    Good Essays
  • Satisfactory Essays

    Safeguarding By Zoe Parkin For the care profession What is abuse? Abuse is when someone does or says something to you that hurts you or makes you feel unhappy, scared or angry and does not feel right to you. Abuse is wrong.…

    • 971 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ACO01 Mock Exam 2015 1

    • 2060 Words
    • 7 Pages

    3. At the beginning of 2009, Glass Manufacturing purchased a new machine for its assembly line at a cost of $600,000. The machine has an estimated useful life of 10 years and estimated residual value of $50.000. Under the straight-line method, how much depreciation would Glass take in 2010 for financial reporting purposes?…

    • 2060 Words
    • 7 Pages
    Satisfactory Essays
  • Powerful Essays

    The subject areas and topics covered by this syllabus within each section of the BoK Test are detailed below. In each case a set of Assessment Outcomes is provided in order to describe the level of coverage required by applicants in each subject area. Where a dominant body of knowledge or best practice guidance exists for specific subject area, this has been used as the basis of the Breadth of Knowledge syllabus coverage. For example applicants should be aware of the key concepts and terminology of the following: Business Change BCS publications in the area of business analysis and business change, specifically the business analysis process model and the main elements of the requirements engineering framework. Solution Development and Implementation Architecture -…

    • 7923 Words
    • 32 Pages
    Powerful Essays
  • Satisfactory Essays

    The type of security was dominant in the early years of computing security was entirely…

    • 994 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    System.out.println("Welcome to Airline Services. We Provide best flights and deals from Delhi and Mumbai to many cities Domestic as well as International");…

    • 5155 Words
    • 21 Pages
    Good Essays
  • Satisfactory Essays

    Exam guidline SMM

    • 386 Words
    • 2 Pages

    • to write a critique of the concept: this is the most difficult part, requiring…

    • 386 Words
    • 2 Pages
    Satisfactory Essays