A+ Essentials Tutorial

6.0 Security

6.1 Identify the fundamental principles of security

  • Identify names, purposes and characteristics of hardware and software security for example:
    • Hardware deconstruction / recycling
    • Smart cards / biometrics (e.g. key fobs, cards, chips and scans)
    • Authentication technologies (e.g. user name, password, biometrics, smart cards)
    • Malicious software protection (e.g. viruses, Trojans, worms, spam, spyware, adware, grayware)
    • Software firewalls
    • File system security (e.g. FAT32 and NTFS)
  • Identify names, purposes and characteristics of wireless security for example:
    • Wireless encryption (e.g. WEP.x and WPA.x) and client configuration
    • Access points (e.g. disable DHCP / use static IP, change SSID from default, disable SSID broadcast, MAC filtering, change default username and password, update firmware, firewall)
  • Identify names, purposes and characteristics of data and physical security
    • Data access (basic local security policy)
    • Encryption technologies
    • Backups
    • Data migration
    • Data / remnant removal
    • Password management
    • Locking workstation (e.g. hardware, operating system)
  • Describe importance and process of incidence reporting
  • Recognize and respond appropriately to social engineering situations

6.2 Install, configure, upgrade and optimize security

  • Install, configure, upgrade and optimize hardware, software and data security for example:
    • BIOS
    • Smart cards
    • Authentication technologies
    • Malicious software protection
    • Data access (basic local security policy)
    • Backup procedures and access to backups
    • Data migration
    • Data / remnant removal

6.3 Identify tool, diagnostic procedures and troubleshooting techniques for security

  • Diagnose and troubleshoot hardware, software and data security issues for example:
    • BIOS
    • Smart cards, biometrics
    • Authentication technologies
    • Malicious software
    • File system (e.g. FAT32, NTFS)
    • Data access (e.g. basic local security policy)
    • Backup
    • Data migration

6.4 Perform preventive maintenance for computer security

  • Implement software security preventive maintenance techniques such as installing service packs and patches and training users about malicious software prevention technologies

Disclaimer: All Simulation Exams practice tests, study guides and/or material are neither sponsored by, nor endorsed by, nor affiliated with CompTIA® or any other company. All trademarks are trademarks of their respective owners and duly  acknowledged. A+™, Network+™, i-Net+™, Server+™,Security+™ are registered trade marks of CompTIA®. The practice tests material is a copyright of SimulationExams.com and the same is not approved or endorsed by respective certifying bodies. Thank-you for your interest in Simulation Exams. Please see read me file before you download, install, and/or use any software from SimulationExams.com For any information or questions regarding this Website, please e-mail webmaster at simulationexams.com