Question 79: You are asked to look at the design and configuration of your switched and routed networks. In the process you discover…

Question 79: You are asked to look at the design and configuration of your switched and routed networks. In the process you discover…
By Steve Fullmer and Mike Danseglio
BUY NOW $495
Buy for Teams
Video Courses > CompTIA Security+ Certification Video Course
Module 1: CompTIA Security + Certification Requirements
Module 2: Risk components and Terms
Solve ALE
5:37
Module 3: Maximum Tolerable Downtime (MTD) Model
Module 4: Basic Security Terms and Categories
Attacks
8:51
Module 5: Defense in Depth Model
Module 6: Basic Data States
Module 7: Authentication Models
Module 8: Security Authorization Techniques
Module 9: Common Account Management Controls
Module 10: Federation Examples
Module 11: Cryptographic Standards
Module 12: Cryptographic Attacks
Module 13: Certification Hierarchy Elements and Interactions
Module 14: Kerberos Authentication Process
Module 15: Windows OS Components and Processes
Module 16: System and Software Attacks
Module 17: System Controls
TCB
2:35
Hardening
7:44
Logging
3:03
Module 18: New Software Development Models
Module 19: Secure Coding Techniques
Module 20: Embedded Systems and Special Considerations
SCADA
2:15
IOT
1:52
Module 21: Virtualization
Module 22: Basic Network Terminology
Layer 4
4:14
Module 23: Network Attack Surfaces
Module 24: Ports Most Susceptible to Attack
DNS Ports
2:50
DHCP
2:26
SSH
5:44
SNMP
3:09
RTP/RTPS
3:54
Module 25: VPN and Remote Access Methods
VPN
4:16
IPSEC
4:19
Module 26: Common Password Elements
NTLM
3:26
PAP/CHAP
5:32
Module 27: Network Attacks
Hijacking
6:13
Module 28: Wireless Attack Surfaces
Module 29: Wireless Attacks
Module 30: Basic Network Controls
DMZ
3:42
Honeypots
2:51
Module 31: Site Survey and Recommend Facility Device Placement
Module 32: Mobile Device Security Controls
Module 33: Unique Mobile Device Issues
Module 34: Cloud Environments and Controls
Module 35: Identify and Use Basic Security Tools
Module 36: Operational Security Frameworks
Module 37: Physical Security Elements
Module 38: Specialized Physical Controls
Man Traps
5:12
Module 39: Human Factor Issues
Humanity
5:17
Module 40: Forensic Practices
Module 41: Organizational Recovery Programs
View Entire Course

Question 79: You are asked to look at the design and configuration of your switched and routed networks. In the process you discover…