Topic | Details |
---|---|
Network Security 20% | |
Implement security configuration parameters on network devices and other technologies. | 1.Firewalls 2.Routers 3.Switches 4.Load balancers 5.Proxies 6.Web security gateways 7.VPN concentrators 8.NIDS and NIPS
10.Spam filter 11.UTM security appliances
13.Application aware devices
|
Given a scenario, use secure network administration principles. | 1. Rule-based management2. Firewall rules 2.VLAN management 3. Secure router configuration 4. Access control lists 5. Port security 6. 802.1x 7. Flood guards 8. Loop protection 9. Implicit deny 10. Network separation 11. Log analysis 12. Unified threat management |
Explain network design elements and components. | 1.DMZ 2. Subnetting 3.VLAN 4.NAT 5.Remote access 6.Telephony 7.NAC 8.Virtualization 9.Cloud computing
|
Given a scenario, implement common protocols and services. | 1.Protocols
|
Given a scenario, troubleshoot security issues related to wireless networking. | 1. WPA2. WPA2 3.WEP 4. EAP 5. PEAP 6. LEAP 7. MAC filter 8. Disable SSID broadcast 9. TKIP 10. CCMP 11. Antenna placement 12. Power level controls 13. Captive portals 14. Antenna types 15. Site surveys 16. VPN (over open wireless) |
Compliance and Operational Security 18% | |
Explain the importance of risk related concepts. | 1.Control types
3.False negatives 4.Importance of policies in reducing riskPrivacy policy Acceptable use Security policy Mandatory vacations Job rotation Separation of duties Least privilege 5.Risk calculation
7.Vulnerabilities 8.Threat vectors 9.Probability/threat likelihood 10. Risk avoidance, transference, acceptance, mitigation, deterrence 11. Risks associated with cloud computing and virtualization 12. Recovery time objective and recovery point objective |
Summarize the security implications of integrating systems and data with third parties. | 1. On-boarding/off-boarding business partners 2.Social media networks and/or applications 3.Interoperability agreements
5. Risk awareness 6. Unauthorized data sharing 7. Data ownership 8. Data backups 9. Follow security policy and procedures 10. Review agreement requirements to verify compliance and performance standards |
Given a scenario, implement appropriate risk mitigation strategies. | 1. Change management2. Incident management 3. User rights and permissions reviews 4. Perform routine audits 5. Enforce policies and procedures to prevent data loss or theft 6.Enforce technology controls
|
Given a scenario, implement basic forensic procedures. | 1. Order of volatility2. Capture system image 3. Network traffic and logs 4. Capture video 5. Record time offset 6. Take hashes 7. Screenshots 8. Witnesses 9. Track man hours and expense 10. Chain of custody 11. Big Data analysis |
Summarize common incident response procedures. | 1. Preparation2. Incident identification 3. Escalation and notification 4. Mitigation steps 5. Lessons learned 6. Reporting 7.Recovery/reconstitution procedures 8.First responder 9. Incident isolation
11.Damage and loss control |
Explain the importance of security related awareness and training. | 1.Security policy training and procedures 2.Role-based training 3.Personally identifiable information 4.Information classification
6. Compliance with laws, best practices and standards 7.User habits
10. Follow up and gather training metrics to validate compliance and security posture |
Compare and contrast physical security and environmental controls. | 1.Environmental controls
|
Summarize risk management best practices. | 1.Business continuity concepts
|
Given a scenario, select the appropriate control to meet the goals of security. | 1.Confidentiality
|
Threats and Vulnerabilities 20% | |
Explain types of malware. | 1. Adware2. Virus 3. Spyware 4. Trojan 5. Rootkits 6. Backdoors 7. Logic bomb 8. Botnets 9.Ransomware 10. Polymorphic malware 11. Armored virus |
Summarize various types of attacks. | 1. Man-in-the-middle2. DDoS 3. DoS 4. Replay 5. Smurf attack 6. Spoofing 7. Spam 8. Phishing 9.Spim 10. Vishing 11. Spear phishing 12. Xmas attack 13.Pharming 14. Privilege escalation 15. Malicious insider threat 16. DNS poisoning and ARP poisoning 17 Transitive access 18. Client-side attacks 19.Password attacks
21.Watering hole attack |
Summarize social engineering attacks and the associated effectiveness with each attack. | 1. Shoulder surfing2. Dumpster diving 3. Tailgating 4. Impersonation 5. Hoaxes 6.Whaling 7.Vishing 8.Principles (reasons for effectiveness)
|
Explain types of wireless attacks. | 1. Rogue access points2. Jamming/interference 3. Evil twin 4. War driving 5. Bluejacking 6. Bluesnarfing 7. War chalking 8. IV attack 9. Packet sniffing 10. Near field communication 11. Replay attacks 12.WEP/WPA attacks 13.WPS attacks |
Explain types of application attacks. | 1. Cross-site scripting2. SQL injection 3.LDAP injection 4. XML injection 5. Directory traversal/command injection 6. Buffer overflow 7. Integer overflow 8. Zero-day 9. Cookies and attachments 10. Locally Shared Objects (LSOs) 11. Flash cookies 12. Malicious add-ons 13. Session hijacking 14. Header manipulation 15. Arbitrary code execution/remote code execution |
Analyze a scenario and select the appropriate type of mitigation and deterrent techniques. | 1.Monitoring system logs
|
Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities. | 1. Interpret results of security assessment tools 2.Tools
|
Explain the proper use of penetration testing versus vulnerability scanning. | 1.Penetration testing
4. White box 5.Gray box |
Application, Data and Host Security 15% | |
Explain the importance of application security controls and techniques. | 1.Fuzzing 2.Secure coding concepts
4. Cross-site Request Forgery (XSRF) prevention 5. Application configuration baseline (proper settings) 6. Application hardening 7. Application patch management 8. NoSQL databases vs. SQL databases 9. Server-side vs. client-side validation |
Summarize mobile security concepts and technologies. | 1.Device security
|
Given a scenario, select the appropriate solution to establish host security. | 1. Operating system security and settings 2.OS hardening 3.Anti-malware
5. Whitelisting vs. blacklisting applications 6. Trusted OS 7. Host-based firewalls 8. Host-based intrusion detection 9. Hardware security
11.Virtualization
|
Implement the appropriate controls to ensure data security. | 1. Cloud storage2. SAN 3. Handling Big Data 4. Data encryption
7. Permissions/ACL 8.Data policies
|
Compare and contrast alternative methods to mitigate security risks in static environments. | 1.Environments
|
Access Control and Identity Management 15% | |
Compare and contrast the function and purpose of authentication services. | 1. RADIUS2. TACACS+ 3.Kerberos 4.LDAP 5. XTACACS 6. SAML 7. Secure LDAP |
Given a scenario, select the appropriate authentication, authorization or access control. | 1. Identification vs. authentication vs. authorization2. Authorization
7.Transitive trust/authentication |
Install and configure security controls when performing account management, based on best practices. | 1. Mitigate issues associated with users with multiple account/ roles and/or shared accounts 2.Account policy enforcement
4. User-assigned privileges 5. User access reviews 6. Continuous monitoring |
Cryptography 12% | |
Given a scenario, utilize general cryptography concepts. | 1. Symmetric vs. asymmetric2. Session keys 3. In-band vs. out-of-band key exchange 4. Fundamental differences and encryption methods
6. Non-repudiation 7. Hashing 8. Key escrow 9. Steganography 10. Digital signatures11. Use of proven technologies 12. Elliptic curve and quantum cryptography 13. Ephemeral key 14. Perfect forward secrecy |
Given a scenario, use appropriate cryptographic methods. | 1. WEP vs. WPA/WPA2 and pre-shared key2. MD5 3.SHA 4.RIPEMD 5. AES 6. DES 7.3DES 8.HMAC 9. RSA 10.Diffie-Hellman 11.RC4 12. One-time pads 13. NTLM 14.NTLMv2 15. Blowfish 16. PGP/GPG 17. Twofish 18. DHE 19. ECDHE 20. CHAP 21. PAP 22. Comparative strengths and performance of algorithms 23. Use of algorithms/protocols with transport encryption
|
Given a scenario, use appropriate PKI, certificate management and associated components. | 1. Certificate authorities and digital certificates
3. Recovery agent 4. Public key 5. Private key 6. Registration 7. Key escrow 8. Trust models |
Let me introduce the payment process to you briefly: log in website, click the SY0-401 VCE PDF as you want among the different versions and add to cart, check your Email address correctly, input discount code(if you have), then pay for it with credit card, finally you can download and use SY0-401 dumps torrent immediately! Please check your operations correctly to avoid some potential mistakes. If you do not have Credit Card's account, it is ok, you choose to pay by credit card about purchasing SY0-401 exam VCE, and then you can pay directly. We promise you here that all your operations are safe and secure, do not need to worry about deceptive behaviors.
My distinguished customers, welcome to our website. I know you want to get deeper understanding about SY0-401 dumps torrent, so we list out some Irresistible features of our products for you, please read it as follows:
Instant Download: Upon successful payment, Our systems will automatically send the product you have purchased to your mailbox by email. (If not received within 12 hours, please contact us. Note: don't forget to check your spam.)
Exam Code | SY0-401 |
Duration | 90 mins |
Schedule Exam | CompTIA Marketplace |
Exam Price | $330 (USD) |
Books / Training | CompTIA CertMaster for Security+ |
Exam Name | CompTIA Security+ |
Sample Questions | CompTIA Security+ Sample Questions |
Number of Questions | 90 |
Passing Score | 750 / 900 |
Reference: https://certification.comptia.org/certifications/security
Some candidates should notice we provide three versions for SY0-401 exam VCE, if you purchase two versions together, you will share 40% or so discount, if you purchase the package including three versions, you will share 60% or so discount, it is really affordable price to obtain our so high passing-rate SY0-401 VCE PDF.
SY0-401 exam VCE were compiled according to the newest test trend, designing for the needs of candidates just like you, On the basis of the newest data collected from former examinee, we made the conclusion that accuracy of SY0-401 VCE PDF exactly have reached to 95 to 100 percent,and the experts still keep updating SY0-401 dumps torrent after each test incessantly, which means you can always know full-scale materials. The most important point: you can download our demo freely as your reference, and you may be impressed by the conciseness and clearness of SY0-401 exam VCE. It is also quite easy to read and remember.
The SY0-401 exam is part of the CompTIA Security Certification. This exam measures your ability in secure networks, pc, cloud solution for small and big enterprise.
This certification exam is targeted for professional expert who want validate their IT security knowledge and skills. CompTIA Security SY0-401 is a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management and it is a mandatory step for your IT security career. CompTIA Security SY0-401 exam will verify if professionals have the right skills to secure networks from hackers attacks in cloud computing and on-premis infrastructures and mobile devices too. CompTIA Security meets the ISO 17024 standard and is approved by U.S. Department of Defense to fulfill Directive 8570.01-M requirements. This is a fundamental step in your career advance as obtaining your Security will automatically boost your career because CompTIA Security is a globally recognized credential with certified professionals working in over 147 countries throughout the world. The certification is for administrators, system engineers, functional consultants, partners, and project managers, and developers which want to proof their ability in the Security world. This is a list of covered topics:
Experts team always make SY0-401 VCE PDF keep up with the pace of the development in this field, and you can spare from anxiousness of wasting time doing the wrong tests materials. The SY0-401 dumps torrent also stimulates real examination conditions, which can give you special experience of examination. In the content of SY0-401 exam VCE, we give you more details about test and information of website. All the important contents can be divided into different parts of questions with our SY0-401 VCE PDF, and provide different choices under each question clearly. After finishing your task, you can review them plenty of times and find out the wrong items, some questions may have explanations for your understanding, and you can practice many times day to day. About some more details about SY0-401 dumps torrent, you can find them by your own, and you may be surprised by its considerate pattern.
Once you place your order of SY0-401 dumps torrent, we will not leave you behind, but providing 24/7 continuous service for you. We will send you the update version of CompTIA SY0-401 exam VCE or you can download them by yourself and raise any questions if you are uncertain about something related to our products by Email.
Over 24436+ Satisfied Customers
VCETorrent Practice Exams are written to the highest standards of technical accuracy, using only certified subject matter experts and published authors for development - no all study materials.
We are committed to the process of vendor and third party approvals. We believe professionals and executives alike deserve the confidence of quality coverage these authorizations provide.
If you prepare for the exams using our VCETorrent testing engine, It is easy to succeed for all certifications in the first attempt. You don't have to deal with all dumps or any free torrent / rapidshare all stuff.
VCETorrent offers free demo of each product. You can check out the interface, question quality and usability of our practice exams before you decide to buy.