Sim-Ex™ Tutorial for A+ Essentials

6.0 Security

6.1 Identify the fundamental principles of security

  • Identify names, purposes and characteristics of hardware and software security for example:
    • Hardware deconstruction / recycling
    • Smart cards / biometrics (e.g. key fobs, cards, chips and scans)
    • Authentication technologies (e.g. user name, password, biometrics, smart cards)
    • Malicious software protection (e.g. viruses, Trojans, worms, spam, spyware, adware, grayware)
    • Software firewalls
    • File system security (e.g. FAT32 and NTFS)
  • Identify names, purposes and characteristics of wireless security for example:
    • Wireless encryption (e.g. WEP.x and WPA.x) and client configuration
    • Access points (e.g. disable DHCP / use static IP, change SSID from default, disable SSID broadcast, MAC filtering, change default username and password, update firmware, firewall)
  • Identify names, purposes and characteristics of data and physical security
    • Data access (basic local security policy)
    • Encryption technologies
    • Backups
    • Data migration
    • Data / remnant removal
    • Password management
    • Locking workstation (e.g. hardware, operating system)
  • Describe importance and process of incidence reporting
  • Recognize and respond appropriately to social engineering situations

6.2 Install, configure, upgrade and optimize security

  • Install, configure, upgrade and optimize hardware, software and data security for example:
    • BIOS
    • Smart cards
    • Authentication technologies
    • Malicious software protection
    • Data access (basic local security policy)
    • Backup procedures and access to backups
    • Data migration
    • Data / remnant removal

6.3 Identify tool, diagnostic procedures and troubleshooting techniques for security

  • Diagnose and troubleshoot hardware, software and data security issues for example:
    • BIOS
    • Smart cards, biometrics
    • Authentication technologies
    • Malicious software
    • File system (e.g. FAT32, NTFS)
    • Data access (e.g. basic local security policy)
    • Backup
    • Data migration

6.4 Perform preventive maintenance for computer security

  • Implement software security preventive maintenance techniques such as installing service packs and patches and training users about malicious software prevention technologies

Disclaimer: Simulationexams.com is not affiliated with any certification vendor, and Sim-Ex™ Practice Exams are written independently by SimulationExams.com and not affiliated or authorized by respective certification providers. Sim-Ex™ is a trade mark of SimulationExams.com or entity representing Simulationexams.com.A+™ is a trademark of CompTIA® organization.