Book Image

CompTIA Security+: SY0-601 Certification Guide - Second Edition

By : Ian Neil
Book Image

CompTIA Security+: SY0-601 Certification Guide - Second Edition

By: Ian Neil

Overview of this book

The CompTIA Security+ certification validates the fundamental knowledge required to perform core security functions and pursue a career in IT security. Authored by Ian Neil, a world-class CompTIA certification trainer, this book is a best-in-class study guide that fully covers the CompTIA Security+ 601 exam objectives. Complete with chapter review questions, realistic mock exams, and worked solutions, this guide will help you master the core concepts to pass the exam the first time you take it. With the help of relevant examples, you'll learn fundamental security concepts from certificates and encryption to identity and access management (IAM). As you progress, you'll delve into the important domains of the exam, including cloud security, threats, attacks and vulnerabilities, technologies and tools, architecture and design, risk management, cryptography, and public key infrastructure (PKI). You can access extra practice materials, including flashcards, performance-based questions, practical labs, mock exams, key terms glossary, and exam tips on the author's website at securityplus.training. By the end of this Security+ book, you'll have gained the knowledge and understanding to take the CompTIA exam with confidence.
Table of Contents (24 chapters)
1
Objectives for the CompTIA Security+ 601 exam
Free Chapter
2
Section 1: Security Aims and Objectives
7
Section 2: Monitoring the Security Infrastructure
12
Section 3: Protecting the Security Environment
17
Section 4: Mock Tests
18
Chapter 13: Mock Exam 1
19
Mock Exam 1 Solutions
20
Chapter 14: Mock Exam 2
21
Mock Exam 2 Solutions

Review Questions

Now it's time to check your knowledge. Answer the questions, then check your answers, found in the Solutions section at the end of the book:

  1. What is a vulnerability in relation to risk management?
  2. What is the purpose of BPA?
  3. What is a multiparty risk?
  4. What is IP theft?
  5. What is the difference between an MOU and an MOA?
  6. What is tokenization and why is it stronger than encryption?
  7. One of the junior members of the IT team installs more copies of a piece of software than are allowed by the licenses that the company has purchased. What have they just carried out?
  8. What is the purpose of an ISA?
  9. How does the shadow IT threat actor operate and what type of attack could benefit from their actions?
  10. What is an inherent risk?
  11. What are the four stages of the information life cycle?
  12. Why would you use STIX\TAXII?
  13. What is the benefit of introducing a separation of duties in the finance department?
  14. What is the...