Wednesday, August 31, 2016

Security+ and Role-BAC Model

If you're planning on taking the Security+ exam, you should understand access control models, including the role-BAC access control model.

 For example, can you answer this sample Security+ question?

Q. Your organization wants to reduce the administrative workload related to account management. Which of the following is the BEST choice?

A. Implement group-based privileges.
B. Implement user-based privileges.
C. Implement the Guest account and Guests group.
D. Implement periodic reviews of user access.

See if you're correct by checking out the answer and explanation here.


Tuesday, August 30, 2016

Order of Volatility and CyberSec First Responder (CFR)

Are you planning to take the CyberSec First Responder (CFR) exam. See if you can answer this sample question?

Q. Consider the following computer elements that can contain data used for digital forensics.
  • Printout
  • CPU cache
  • SSD
  • Virtual memory
Which of the following accurately identifies the correct order of volatility from most volatile to least volatile?

A. Printout, CPU cache, SSD, virtual memory
B. CPU cache, printout, virtual memory, SSD
C. SSD, virtual memory, printout, CPU cache
D. CPU cache, virtual memory, SSD, printout

Do you know the correct answer? More, do you why the incorrect answers are incorrect? Check out this post for the full answer and explanation.






Saturday, August 27, 2016

MTBF, MTTF, MTTR Metrics

Risk management experts often use metrics such as MTTR, MTTF, and MTBF to quantify risk. If you're planning on taking the Security+ exam, you should understand the differences between them. For example, can you answer this sample Security+ question?
Q. Lisa is the new CTO at your organization. She wants to ensure that critical business systems are protected from isolated outages. Which of the following would let her know how often these systems will experience outages?
A. MITM
B. MTBF
C. MTTF
D. MTTR
More, do you know why the correct answer is correct and the incorrect answers are incorrect? The answer and explanation is available at the end of this post.

Friday, August 26, 2016

Understanding Common Attacks

Social engineering attacks can occur in person, over the phone, while surfing the Internet, and via email. If you're planning on taking the Security+ exam, you should have a good understanding of the common attacks. 

Here's a sample Security+ question related to attacks:

Q. A security administrator at a shopping mall discovered two wireless cameras pointing at an automatic teller machine. These cameras were not installed by mall personnel and are not authorized. What is the MOST likely goal of these cameras?
A. Tailgating
B. Dumpster diving
C. Vishing
D. Shoulder surfing

Can you answer the question? The answer and explanation is available here.

Wednesday, August 24, 2016

Basic Wireless Network

The Network+ exam expects you to be able to plan and implement a basic network, sometimes referred to as a small office home office (SOHO) network. If you’re planning on taking the Network+ exam, you should have a basic understanding of the device list for a basic wireless network.
For example, can you answer this question?
Q. You are helping a business owner set up a small office network. Employees have ten laptops, each with Wi-Fi capabilities. The office has a DSL line. What equipment needs to be purchased? (Choose TWO.)
A. ISP
B. Wireless router
C. Modem
D. DSL balancer
E. Ten cables for the ten computers
More, do you know why the correct answer is correct and the incorrect answers are incorrect? The answer and explanation is available here.

Monday, August 22, 2016

Protecting Web Servers

If you're planning on taking the Security+ exam, you should have a good understanding of firewalls that protect web servers. For example, can you answer this question?

Q. Which of the following operates on the HIGHEST layer of the OSI model, and is the most effective at blocking application attacks?
A. IDS
B. Router
C. WAF
D. Stateless firewall

More, do you know why the correct answer is correct and the incorrect answers are incorrect? The answer and explanation is available here.


Friday, August 19, 2016

Understanding Failover Clusters

If you're planning on taking the Security+ exam, you should have a good understanding of failover clusters and how they provide high availability for a service offered by a server. For example, can you answer this question?

Q. Your organization hosts a web site with a back-end database server. During a recent power outage, the server crashed, resulting in a significant amount of lost data. Which of the following can your organization implement to prevent this loss from occurring again?
A. Redundancy
B. Disaster recovery procedures
C. Warm site
D. Higher RTO

More, do you know why the correct answer is correct and the incorrect answers are incorrect? The answer and explanation is available here.

Wednesday, August 17, 2016

Network Safety Precautions

When working on computers and networks, it’s important to pay attention to safety. If you're planning on taking the Network+ exam, you should have a basic understanding of network safety precautions. For example, can you answer this question?

Q. A technician has had prolonged contact with a cleaning agent and is getting a rash. Which of the following will provide the best information in this scenario?
A. SLA
B. MOU
C. SOW
D. MSDS



Monday, August 15, 2016

PKI and Security+

A Public Key Infrastructure (PKI) is a group of technologies used to request, create, manage, store, distribute, and revoke digital certificates. If you're planning on taking the Security+ exam, you should have a good understanding of PKI components. For example, can you answer this question?

Q. An organization is planning to implement an internal PKI for smart cards. Which of the following should the organization do FIRST?
A. Install a CA.
B. Generate key pairs.
C. Generate a certificate.
D. Identify a recovery agent.

More, do you know why the correct answer is correct and the incorrect answers are incorrect? You can view the answer and explanation here.

Thursday, August 11, 2016

Intrusion detection systems (IDSs) help detect system and network attacks. If you're planning on taking the Security+ exam, you should understand how they detect attacks. For example, can you answer this sample question ?
Q. A HIDS reported a vulnerability on a system using an assigned vulnerability identification number. After researching the number on the vendor’s web site, you identify the recommended solution and begin applying it. What type of HIDS is in use? A. Network-based B. Signature-based C. Heuristic-based D. Anomaly-based

Tuesday, August 9, 2016

Reconnaissance Incidents and CFR

Are you considering the CyberSec First Responder (CFR) certification. If so, see if you can answer this sample practice test question.
Q. An APT has launched an attack on an organization. At which stage of the attack would the APT gather as much information as possible about the organization, including information about the technology it uses, its personnel, and its online presence?
A. Fingerprinting B. Footprinting C. Enumeration D. Scanning

Check out the answer and full explanation here.

Monday, August 8, 2016

If you're planning on taking the Security+ exam, you should have a basic understanding of how a network perimeter can provide a layer of protection for Internet-facing servers.

For example, can you answer this question?

Q. Your organization hosts a web server and wants to increase its security. You need to separate all web-facing traffic from internal network traffic. Which of the following provides the BEST solution? 

A. VLAN
B. Firewall
C. DMZ
D. WAF

More, do you know why the correct answer is correct and the incorrect answers are incorrect? The answer and explanation is available here.


Saturday, August 6, 2016

Logical Access Control Principles

Do you know about logical access controls? For example, can you answer this sample Security+ question? Q. You maintain a training lab with 18 computers. You have enough rights and permissions on these machines so that you can configure them as needed for classes. However, you do not have the rights to add them to your organization’s domain. Which of the following choices BEST describes this example? A. Least privilege B. Need to know C. User-based privileges D. Separation of duties More, do you know why the correct answer is correct and the incorrect answers are incorrect? You can view the answer and explanation here.

Monday, August 1, 2016

Increasing Availability

Can you answer this Security+ question?
Q. A network administrator configured several servers to work together to increase the processing capabilities for a web application. What does the administrator MOST likely implement?
A. Failover clustering
B. RAID-6
C. EMI shielding
D. Load balancing
More, do you know why the correct answer is correct and the incorrect answers are incorrect? The answer and explanation is available here.