Ebook CompTIA Security+: Get Certified Get Ahead SY0501 Study GuideObjective to Chapter Map 1.0 Threats, Attacks and Vulnerabilities 21% 2.0 Technologies and Tools 22% 3.0 Architecture and Design 15% 4.0 Identity and Access Management 16% 5.0 Risk Management 14% 6.0 Cryptography and PKI 12%
Trang 1||||||||||||||||||||
Trang 2CompTIA Security+:
Get Certified Get Ahead
SY0-501 Study Guide
Darril Gibson
Trang 3CompTIA Security+: Get Certified Get Ahead SY0-501
Study Guide Copyright © 2017 by Darril Gibson
All rights reserved
Printed in the United States of America
No part of this book may be used or reproduced in any manner whatsoever withoutwritten permission except in the case of brief quotations embodied in critical articlesand review For information, contact YCDA, LLC
1124 Knights Bridge Lane,
Virginia Beach, VA, 23455
YCDA, LLC books may be purchased for educational, business, or sales promotionaluse For information, please contact Darril Gibson at darril@darrilgibson.com
Copy editor: Karen Annett
Technical editor: Chris
Trang 4To my wife, who even after 25 years of marriage continues to remind
me how wonderful life can be if you’re in a loving relationship
Thanks for sharing your life with
me
Trang 5Books of this size and depth can’t be done by a single person, and I’m gratefulfor the many people who helped me put this book together First, thanks to my wife.She has provided me immeasurable support throughout this project The technicaleditor, Chris Crayton, provided some great feedback on each of the chapters and theonline labs If you have the paperback copy of the book in your hand, you’re enjoyingsome excellent composite editing work done by Susan Veach
I’m extremely grateful for all the effort Karen Annett put into this project She’s
an awesome copy editor and proofer and the book is tremendously better due to allthe work she’s put into it Last, thanks to my assistant Jaena Nerona who helped withmany of the details behind the scenes She helped me with some quality control and
project management More, she managedmost of the daily tasks associated with maintaining online web sites
While I certainly appreciate all the feedback everyone gave me, I want tostress that any errors that may have snuck into this book are entirely my fault and noreflection on anyone who helped I always strive to identify and remove every error,but they still seem to sneak in
Special thanks to:
• Chief Wiggum for bollards installation
• Nelson Muntz for personal physical security services
• Martin Prince for educating us about downgrade attacks
• Comp-Global-Hyper-Mega-Net for intermittent HTTP services
• Edna Krabapple for her thoughtful continuing education lessons
• Apu Nahasapeemapetilon for technical advice on secure coding concepts
• Moe Szyslak for refreshments and uplifting our spirits with his talks aboutRATs
About the Author
Darril Gibson is the CEO of YCDA, LLC (short for You Can Do Anything) Hehas contributed to more than 40 books as the author, coauthor, or technical editor.Darril regularly writes, consults, and teaches on a wide variety of technical andsecurity topics and holds several certifications, including CompTIA A+, Network+,
||||||||||||||||||||
Trang 6In response to repeated requests, Darril created the http://gcgapremium.com/
site where he provides study materials for several certification exams, including theCompTIA Security+ exam Darril regularly posts blog articles at
http://blogs.getcertifiedgetahead.com/, and uses the site to help people stay abreast
of changes in certification exams You can contact him through either of these sites
Additionally, Darril publishes the Get Certified Get Ahead newsletter Thisweekly newsletter typically lets readers know of new blog posts and about updatesrelated to CompTIA certification exams You can sign up at http://eepurl.com/g44Of
Darril lives in Virginia Beach with his wife and two dogs Whenever possible,they escape to a small cabin in the country on over twenty acres of land thatcontinue to provide them with peace, tranquility, and balance
Trang 7Table of Contents
Dedication iii
Acknowledgments iv
About the Author iv
Introduction 1
Who This Book Is For 1
About This Book 2
How to Use This Book 2
Conventions 3
Remember This 3
Vendor Neutral 4
Free Online Resources 4
Additional Web Resources 5
Assumptions 5
Set a Goal 6
About the Exam 6
Passing Score 6
Exam Prerequisites 6
Beta Questions 7
Exam Format 7
Question Types 7
Multiple Choice 7
Performance-Based Questions 7
Question Complexity 9
Video 10
Exam Test Provider 10
Voucher Code for 10 Percent Off 10
Exam Domains 11
Objective to Chapter Map 11
1.0 Threats, Attacks and Vulnerabilities 21% 11
||||||||||||||||||||
Trang 83.0 Architecture and Design 15% 19
4.0 Identity and Access Management 16% 24
5.0 Risk Management 14% 26
6.0 Cryptography and PKI 12% 29
Recertification Requirements 32
Pre-Assessment Exam 35
Assessment Exam Answers 49
Chapter 1 61
Mastering Security Basics 61
Understanding Core Security Goals 62
What Is a Use Case? 62
Ensure Confidentiality 63
Encryption 63
Access Controls 63
Steganography and Obfuscation 64
Provide Integrity 64
Hashing 64
Digital Signatures, Certificates, and Non-Repudiation 66
Increase Availability 67
Redundancy and Fault Tolerance 67
Patching 68
Resource Versus Security Constraints 68
Introducing Basic Risk Concepts 68
Understanding Control Types 69
Technical Controls 70
Administrative Controls 70
Physical Controls 71
Control Goals 71
Preventive Controls 72
Detective Controls 73
Comparing Detection and Prevention Controls 74
Trang 9Corrective Controls 74
Deterrent Controls 74
Compensating Controls 74
Combining Control Types and Goals 75
Implementing Virtualization 75
Comparing Hypervisors 76
Application Cell or Container Virtualization 76
Secure Network Architecture 77
Snapshots 77
VDI/VDE and Non-Persistence 78
VMs as Files 78
Risks Associated with Virtualization 79
Running Kali Linux in a VM 80
Using Command-Line Tools 80
Windows Command Line 80
Linux Terminal 81
Understanding Switches and Getting Help 82
Understanding Case 82
Ping 82
Using Ping to Check Name Resolution 83
Beware of Firewalls 84
Using Ping to Check Security Posture 84
Ipconfig, ifconfig, and ip 84
Netstat 86
Tracert 87
Arp 88
Chapter 1 Exam Topic Review 88
Chapter 1 Practice Questions 90
Chapter 1 Practice Question Answers 92
Chapter 2 95
Understanding Identity and Access Management 95
Exploring Authentication Concepts 96
Comparing Identification and AAA 96
||||||||||||||||||||
Trang 10Something You Know 97
Something You Have 103
Something You Are 106
Somewhere You Are 107
Something You Do 108
Dual-Factor and Multifactor Authentication 109
Summarizing Identification Methods 109
Troubleshooting Authentication Issues 109
Comparing Authentication Services 110
Kerberos 110
NTLM 111
LDAP and LDAPS 111
Single Sign-On 112
SSO and Transitive Trusts 113
SSO and SAML 114
SAML and Authorization 114
SSO and a Federation 114
OAuth and OpenID Connect 115
Managing Accounts 115
Least Privilege 116
Need to Know 116
Account Types 117
Require Administrators to Use Two Accounts 117
Standard Naming Convention 118
Prohibiting Shared and Generic Accounts 118
Disablement Policies 119
Recovering Accounts 119
Time-of-Day Restrictions 120
Location-Based Policies 120
Expiring Accounts and Recertification 121
Account Maintenance 121
Credential Management 121
Trang 11Comparing Access Control Models 122
Role-Based Access Control 122
Using Roles Based on Jobs and Functions 123
Documenting Roles with a Matrix 123
Establishing Access with Group-Based Privileges 124
Rule-Based Access Control 126
Discretionary Access Control 126
SIDs and DACLs 126
The Owner Establishes Access 127
Beware of Trojans 127
Mandatory Access Control 127
Labels and Lattice 128
Establishing Access 129
Attribute-Based Access Control 129
Chapter 2 Exam Topic Review 130
Chapter 2 Practice Questions 133
Chapter 2 Practice Question Answers 136
Chapter 3
.139
Exploring Network Technologies and Tools 139
Reviewing Basic Networking Concepts 140
Basic Networking Protocols 140
Implementing Protocols for Use Cases 142
Voice and Video Use Case 142
File Transfer Use Case 142
Email and Web Use Cases 144
Directory Services Use Case 145
Remote Access Use Cases 145
Time Synchronization Use Case 146
Network Address Allocation Use Case 146
Domain Name Resolution Use Case 147
Subscription Services Use Case 149
Understanding and Identifying Ports 149
||||||||||||||||||||
Trang 12IP Address Used to Locate Hosts 151
Server Ports 151
Client Ports 151
Putting It All Together 151
The Importance of Ports in Security 153
Understanding Basic Network Devices 154
Switches 154
Security Benefit of a Switch 155
Port Security 155
Physical Security of a Switch 155
Loop Prevention 155
Flood Attacks and Flood Guards 156
Routers 157
Routers and ACLs 157
Implicit Deny 158
Antispoofing 158
Bridge 159
Aggregation Switch 160
Firewalls 160
Host-Based Firewalls 160
Application-Based Versus Network-Based Firewalls 161
Stateless Firewall Rules 162
Stateful Versus Stateless 162
Web Application Firewall 163
Implementing a Secure Network 163
Zones and Topologies 163
DMZ 163
Understanding NAT and PAT 165
Network Separation 166
Physical Isolation and Airgaps 166
Logical Separation and Segmentation 166
Comparing a Layer 2 Versus Layer 3 Switch 166
Trang 13Isolating Traffic with a VLAN 167
Media Gateway 167
Proxy Servers 167
Caching Content for Performance 168
Transparent Proxy Versus Nontransparent Proxy 168
Reverse Proxy 169
Application Proxy 169
Unified Threat Management 170
Mail Gateways 171
Summarizing Routing and Switching Use Cases 172
Chapter 3 Exam Topic Review 173
Chapter 3 Practice Questions 175
Chapter 3 Practice Question Answers 177
Chapter 4
.181
Securing Your Network 181
Exploring Advanced Security Devices 182
Understanding IDSs and IPSs 182
HIDS 182
NIDS 183
Sensor and Collector Placement 183
Detection Methods 184
IPS Versus IDS—Inline Versus Passive 187
SSL/TLS Accelerators 188
SSL Decryptors 189
SDN 189
Honeypots 190
Honeynets 190
IEEE 802.1x Security 191
Securing Wireless Networks 192
Reviewing Wireless Basics 192
Fat Versus Thin Access Points 193
Band Selection and Channel Widths 193
||||||||||||||||||||
Trang 14Disable SSID Broadcasting or Not 194
Enable MAC Filtering 195
Antenna Types and Placement 196
Antenna Power and Signal Strength 197
Network Architecture Zones 198
Wireless Cryptographic Protocols 198
WPA 198
WPA2 198
TKIP Versus CCMP 199
PSK, Enterprise, and Open Modes 199
Authentication Protocols 201
Captive Portals 202
Understanding Wireless Attacks 202
Disassociation Attacks 202
WPS and WPS Attacks 203
Rogue AP 203
Evil Twin 204
Jamming Attacks 204
IV Attacks 205
NFC Attacks 205
Bluetooth Attacks 205
Wireless Replay Attacks 206
RFID Attacks 206
Misconfigured Access Points 207
Using VPNs for Remote Access 207
VPNs and VPN Concentrators 208
Remote Access VPN 208
IPsec as a Tunneling Protocol 209
TLS as a Tunneling Protocol 209
Split Tunnel Versus Full Tunnel 209
Site-to-Site VPNs 210
Always-On VPN 211
Trang 15Network Access Control 211
Host Health Checks 211
Permanent Versus Dissolvable 212
Identity and Access Services 213
PAP 214
CHAP 214
MS-CHAP and MS-CHAPv2 214
RADIUS 214
TACACS+ 215
Diameter 216
AAA Protocols 216
Chapter 4 Exam Topic Review 216
Chapter 4 Practice Questions 219
Chapter 4 Practice Question Answers 222
Chapter 5
.225
Securing Hosts and Data 225
Implementing Secure Systems 226
Operating Systems 227
Secure Operating System Configurations 228
Using Master Images 229
Resiliency and Automation Strategies 230
Secure Baseline and Integrity Measurements 230
Patch Management 231
Change Management Policy 232
Unauthorized Software and Compliance Violations 233
Application Whitelisting and Blacklisting 233
Secure Staging and Deployment 234
Sandboxing with VMs 234
Sandboxing with Chroot 234
Secure Staging Environment 235
Peripherals 235
Hardware and Firmware Security 236
||||||||||||||||||||
Trang 16FDE and SED 237
UEFI and BIOS 237
Trusted Platform Module 237
Hardware Security Module 238
Additional Vulnerabilities 239
Summarizing Cloud Concepts 239
Software as a Service 240
Platform as a Service 240
Infrastructure as a Service 240
Security Responsibilities with Cloud Models 241
Security as a Service 241
Cloud Deployment Models 242
Deploying Mobile Devices Securely 243
Deployment Models 243
Connection Methods 244
Mobile Device Management 245
Mobile Device Enforcement and Monitoring 247
Unauthorized Software 248
Hardware Control 249
Unauthorized Connections 250
Exploring Embedded Systems 250
Security Implications and Vulnerabilities 251
Comparing Embedded Systems 252
Protecting Data 254
Protecting Confidentiality with Encryption 254
Database Security 255
File System Security 255
Data Loss Prevention 257
Removable Media 257
Data Exfiltration 258
Cloud-Based DLP 258
Chapter 5 Exam Topic Review 259
Trang 17Chapter 5 Practice Questions 262
Chapter 5 Practice Question Answers 264
Chapter 6
.267
Comparing Threats, Vulnerabilities, and Common Attacks 267
Understanding Threat Actors 268
Determining Malware Types 270
Viruses 271
Worms 271
Logic Bombs 271
Backdoors 272
Trojans 273
RAT 274
Ransomware 274
Keylogger 275
Spyware 275
Adware 276
Bots and Botnets 276
Rootkits 277
Recognizing Common Attacks 278
Social Engineering 278
Impersonation 279
Shoulder Surfing 279
Tricking Users with Hoaxes 279
Tailgating and Mantraps 280
Dumpster Diving 280
Watering Hole Attacks 280
Attacks via Email and Phone 281
Spam 281
Phishing 281
Spear Phishing 284
Whaling 284
Vishing 285
||||||||||||||||||||
Trang 18Blocking Malware and Other Attacks 287
Protecting Systems from Malware 287
Antivirus and Anti-Malware Software 288
Data Execution Prevention 289
Advanced Malware Tools 290
Spam Filters 290
Educating Users 291
New Viruses 291
Phishing Attacks 291
Zero-Day Exploits 292
Why Social Engineering Works 292
Authority 293
Intimidation 293
Consensus 293
Scarcity 294
Urgency 294
Familiarity 294
Trust 294
Chapter 6 Exam Topic Review 295
Chapter 6 Practice Questions 297
Chapter 6 Practice Question Answers 300
Chapter 7
.303
Protecting Against Advanced Attacks 303
Comparing Common Attacks 304
DoS Versus DDoS 304
Privilege Escalation 304
Spoofing 305
SYN Flood Attacks 305
Man-in-the-Middle Attacks 306
ARP Poisoning Attacks 306
ARP Man-in-the-Middle Attacks 307
Trang 19ARP DoS Attack 307
DNS Attacks 308
DNS Poisoning Attacks 308
Pharming Attacks 308
DDoS DNS Attacks 308
Amplification Attacks 309
Password Attacks 309
Brute Force Attacks 310
Dictionary Attacks 310
Password Hashes 311
Pass the Hash Attacks 311
Birthday Attacks 311
Rainbow Table Attacks 312
Replay Attacks 313
Known Plaintext Attacks 313
Hijacking and Related Attacks 314
Domain Hijacking 315
Man-in-the-Browser 315
Driver Manipulation 315
Zero-Day Attacks 316
Memory Buffer Vulnerabilities 316
Memory Leak 316
Integer Overflow 317
Buffer Overflows and Buffer Overflow Attacks 317
Pointer Dereference 318
DLL Injection 319
Summarizing Secure Coding Concepts 319
Compiled Versus Runtime Code 319
Proper Input Validation 319
Client-Side and Server-Side Input Validation 320
Other Input Validation Techniques 321
Avoiding Race Conditions 321
Proper Error Handling 322
Cryptographic Techniques 322
||||||||||||||||||||
Trang 20Code Obfuscation 323
Code Quality and Testing 324
Development Life-Cycle Models 324
Secure DevOps 325
Version Control and Change Management 326
Provisioning and Deprovisioning 327
Identifying Application Attacks 327
Web Servers 327
Database Concepts 328
Normalization 328
SQL Queries 330
Injection Attacks 332
Cross-Site Scripting 332
Cross-Site Request Forgery 333
Understanding Frameworks and Guides 334
Chapter 7 Exam Topic Review 335
Chapter 7 Practice Questions 337
Chapter 7 Practice Question Answers 340
Chapter 8
.343
Using Risk Management Tools 343
Understanding Risk Management 344
Threats and Threat Assessments 344
Vulnerabilities 346
Risk Management 346
Risk Assessment 347
Risk Registers 350
Supply Chain Assessment 351
Comparing Scanning and Testing Tools 351
Checking for Vulnerabilities 351
Password Crackers 352
Network Scanners 352
Trang 21Banner Grabbing 356
Vulnerability Scanning 356
Credentialed Versus Non-Credentialed 358
Configuration Compliance Scanner 359
Obtaining Authorization 359
Penetration Testing 359
Passive Reconnaissance 360
Active Reconnaissance 360
Initial Exploitation 361
Escalation of Privilege 361
Pivot 361
Persistence 362
White, Gray, and Black Box Testing 362
Intrusive Versus Non-Intrusive Testing 363
Passive Versus Active Tools 363
Exploitation Frameworks 364
Using Security Tools 364
Sniffing with a Protocol Analyzer 364
Command-Line Tools 366
Tcpdump 366
Nmap 366
Netcat 367
Monitoring Logs for Event Anomalies 367
Operating System Event Logs 368
Firewall and Router Access Logs 368
Linux Logs 368
Other Logs 369
SIEM 370
Continuous Monitoring 371
Usage Auditing and Reviews 371
Permission Auditing and Review 372
Chapter 8 Exam Topic Review 373
Chapter 8 Practice Questions 376
||||||||||||||||||||
Trang 22Chapter 9 381
Implementing Controls to Protect Assets 381
Implementing Defense in Depth 382
Comparing Physical Security Controls 383
Using Signs 384 Comparing Door Lock Types 384 Securing Door Access with Cipher Locks 384 Securing Door Access with Cards 385 Securing Door Access with Biometrics 385
Tailgating 386 Preventing Tailgating with Mantraps 386 Increasing Physical Security with Guards 387 Monitoring Areas with Cameras 387 Fencing, Lighting, and Alarms 388 Securing Access with Barricades 389 Using Hardware Locks 389
Securing Mobile Computers with Cable Locks 390 Securing Servers with Locking Cabinets 390 Securing Small Devices with a Safe 390
Asset Management 391 Implementing Environmental Controls 391 Heating, Ventilation, and Air Conditioning 391
Hot and Cold Aisles 392 HVAC and Fire 392 Fire Suppression 393 Environmental Monitoring 393
Shielding 394
Protected Cabling 394 Protected Distribution of Cabling 394
Faraday Cage 395 Adding Redundancy and Fault Tolerance 395
Trang 23Single Point of Failure 395 Disk Redundancies 396
RAID-0 396 RAID-1 397 RAID-5 and RAID-6 397
RAID-10 397 Server Redundancy and High Availability 397 Failover Clusters for High Availability 398 Load Balancers for High Availability 399 Clustering Versus Load Balancing 400
Power Redundancies 400 Protecting Data with Backups 400
Comparing Backup Types 401
Full Backups 401 Restoring a Full Backup 402 Differential Backups 402 Order of Restoration for a Full/Differential Backup Set 402
Incremental Backups 402 Order of Restoration for a Full/Incremental Backup Set 403 Choosing Full/Incremental or Full/Differential 403
Snapshot Backup 403 Testing Backups 404 Protecting Backups 404 Backups and Geographic Considerations 404 Comparing Business Continuity Elements 405
Business Impact Analysis Concepts 406
Impact 407 Privacy Impact and Threshold Assessments 407
Recovery Time Objective 408 Recovery Point Objective 408 Comparing MTBF and MTTR 408 Continuity of Operations Planning 409
Recovery Sites 409 Order of Restoration 411
||||||||||||||||||||
Trang 24Testing Plans with Exercises 412 Chapter 9 Exam Topic Review 413
Chapter 9 Practice Questions 416
Chapter 9 Practice Question Answers 419
Chapter 10 423
Understanding Cryptography and PKI 423
Introducing Cryptography Concepts 424
Providing Integrity with Hashing 425
MD5 425 SHA 426 HMAC 426 RIPEMD 427 Hashing Files 427 Hashing Passwords 428 Key Stretching 428 Hashing Messages 429 Using HMAC 430 Providing Confidentiality with Encryption 432
Encryption Terms 433 Block Versus Stream Ciphers 434
Cipher Modes 435 Symmetric Encryption 435
AES 437 DES 438 3DES 438 RC4 438 Blowfish and Twofish 438 Symmetric Encryption Summary 439 Asymmetric Encryption 439
The Rayburn Box 440 The Rayburn Box Used to Send Secrets 440
Trang 25The Rayburn Box Used for Authentication 441
The Rayburn Box Demystified 441
Certificates 441 RSA 443 Static Versus Ephemeral Keys 443 Elliptic Curve Cryptography 443
Diffie-Hellman 444 Steganography 444 Using Cryptographic Protocols 445
Protecting Email 446 Signing Email with Digital Signatures 446
Encrypting Email 448 S/MIME 450 PGP/GPG 450 HTTPS Transport Encryption 450
SSL Versus TLS 450
Encrypting HTTPS Traffic with TLS 451
Cipher Suites 452 Implementation Versus Algorithm Selection 453 Downgrade Attacks on Weak Implementations 453 Exploring PKI Components 454
Certificate Authority 454 Certificate Chaining and Trust Models 455
Registration and CSRs 456 Revoking Certificates 457 Certificate Issues 458 Public Key Pinning 459 Key Escrow 460 Recovery Agent 460 Comparing Certificate Types 460 Certificate Formats 461 Chapter 10 Exam Topic Review 463
Chapter 10 Practice Questions 466
||||||||||||||||||||
Trang 26Chapter 11 473
Implementing Policies to Mitigate Risks 473
Exploring Security Policies 474
Personnel Management Policies 474
Acceptable Use Policy 475 Mandatory Vacations 475 Separation of Duties 476 Job Rotation 477 Clean Desk Policy 477 Background Check 479
NDA 479 Exit Interview 479 Onboarding 480 Policy Violations and Adverse Actions 480 Other General Security Policies 481
Agreement Types 483 Protecting Data 484
Information Classification 484 Data Sensitivity Labeling and Handling 485 Data Destruction and Media Sanitization 486
Data Retention Policies 487
PII and PHI 488 Protecting PII and PHI 488 Legal and Compliance Issues 489 Data Roles and Responsibilities 490
Responding to Incidents 491
Incident Response Plan 491 Incident Response Process 492 Implementing Basic Forensic Procedures 493
Order of Volatility 494 Data Acquisition and Preservation of Evidence 495
Trang 27Chain of Custody 498 Legal Hold 499 Recovery of Data 499 Active Logging for Intelligence Gathering 500
Track Man-Hours and Expense 500 Providing Training 500
Role-Based Awareness Training 500
Continuing Education 501 Training and Compliance Issues 502 Troubleshooting Personnel Issues 502 Chapter 11 Exam Topic Review 503
Chapter 11 Practice Questions 505
Chapter 11 Practice Question Answers 508
Post-Assessment Exam .511
Assessment Exam Answers 524
Appendix A—Glossary 537
Index 569
||||||||||||||||||||
Trang 28Congratulations on your purchase of CompTIA Security+: Get Certified GetAhead study guide Yo u are one step closer to becoming CompTIA Security+certified This certification has helped many individuals get ahead in their jobs andtheir careers, and it can help you get ahead, too
It is a popular certification within the IT field One IT hiring manager told methat if a résumé doesn’t include the Security+ certification, or a higher-level securitycertification, he simply sets it aside He won’t even talk to applicants That’s not thesame with all IT hiring managers, but it does help illustrate how important security
is within the IT field
Who This Book Is For
If you’re studying for the CompTIA Security+ exam and want to pass it on yourfirst attempt, this book is for you It covers 100 percent of the objectives identified byCompTIA for the Security+ exam
The first target audience for this book is students in CompTIA Security+classes My goal is to give students a book they can use to study the relevant andimportant details of CompTIA Security+ in adequate depth for the challengingtopics, but without the minutiae in topics that are clear for most IT professionals Iregularly taught from the earlier editions of this book, and I’ll continue to teach usingthis edition I also hear from instructors around the United States and in severalother countries who use versions of the book to help students master the topics andpass the Security+ exam the first time they take it
Second, this book is for those people who like to study on their own If you’reone of the people who can read a book and learn the material without sitting in aclass, this book has what you need to take and pass the exam
Additionally, you can keep this book on your shelf (or in your Kindle) toremind yourself of important, relevant concepts These concepts are important forsecurity professionals and IT professionals in the real world
Based on many conversations with students and readers of the previous
Trang 29versions of this book, I know that many people use the Security+ certification as thefirst step in achieving other security certifications For example, you may followSecurity+ with one of these cybersecurity certifications:
• (ISC)2 Systems Security Certified Practitioner (SSCP)
• (ISC)2 Certified Information Systems Security Professional (CISSP)
• CompTIA Advanced Security Practitioner (CASP)
• CompTIA Cybersecurity Analyst (CSA+)
If you plan to pursue any of these advanced security certifications, you’ll findthis book will help you lay a solid foundation of security knowledge Learn thismaterial, and you’ll be a step ahead on the other exams
||||||||||||||||||||
Trang 30About This Book
Over the past several years, I’ve taught literally hundreds of students, helpingthem to become CompTIA Security+ certified During that time, I’ve learned what
concepts are easy to grasp and what concepts need more explanation I’ve
developed handouts and analogies that help students grasp the elusive concepts
Feedback from students was overwhelmingly positive—both in their comments
to me and their successful pass rates after taking the certification exam When the
objectives changed in 2008, I rewrote my handouts as the first edition of this book
When the objectives changed again in 2011 and 2014, I rewrote the book to reflect
the new objectives This book reflects the objective changes released in 2017
Gratefully, this book has allowed me to reach a much larger audience andshare security and IT-related information Even if you aren’t in one of the classes I
teach, this book can help you learn the relevant material to pass the exam the first
time you take it
How to Use This Book
Over the years, I’ve taught the Security+ course many times During thisprocess, I learned the best way to present the material so that students understand and
retain the most knowledge The book is laid out the same way
For most people, the easiest way to use the book is by starting with the assessment exam (after the intro) to gauge your initial understanding of the topics
pre-Then, go through each chapter sequentially, including the end-of-chapter practice test
questions Doing so, you’ll build a solid foundation of knowledge This helps make
the more advanced topics in later chapters easier to understand
If you have a high level of IT security knowledge and only want to study thetopics that are unclear to you on this exam, you can review the objective map listed
at the end of the introduction This lists all the objectives and identifies the chapter
where the objective topics are covered Additionally, you can look at the index tolocate the exact page for these topics If you have the Kindle version, it includes an
excellent search feature you can use to find a specific topic When practicing for any
certification exam, the following steps are a good recipe for success:
• Review the objectives The objectives for the SY0-501 exam are listed
in the “Objective to Chapter Map” section in this Introduction
• Learn the material related to the objectives This book covers all the
objectives, and the introduction includes a map showing which chapter (or
Trang 31chapters) covers each objective Along those lines, my goal when writingthe book was to cover the objectives at sufficient depth to help you pass theexam However, these topics all have a lot more depth When I study for acertification exam, I typically dig in much deeper than necessary, oftenbecause the topics interest me You can, too, if you want, but don’t lose site
of the exam objectives
• Take practice questions A key step when preparing for any certification
exam is to make sure you can answer the exam questions Yes, you need theknowledge, but you also must be able to read a question and select thecorrect answer This simply takes practice When using practice testquestions, ensure they have explanations Questions without explanationsoften encourage rote memorization without understanding and sometimeseven give you the wrong answers
||||||||||||||||||||
Trang 32• Achieve high scores on practice exams I typically tell people that they
should get scores of at least 90 percent on practice tests for the CompTIASecurity+ exam However, don’t focus on only your scores
• Read and understand the explanations Ideally, you should be able to
look at any practice test question and know why the correct answers arecorrect and why the incorrect answers are incorrect Within this book, you’llfind this information in the explanations When you understand theexplanations, you have the best chance of accurately interpreting thequestions on the live exam and answering them correctly no matter howCompTIA words or presents them
This book has over 300 practice test questions you can use to test yourknowledge and your ability to correctly answer them Every question has a detailed
explanation to help you understand why the correct answers are correct and why the
incorrect answers are incorrect
You can find the practice questions in the following areas:
• Pre-assessment exam Use these questions at the beginning of the book
to get a feel for what you know and what you need to study more
• End-of-chapter practice questions Each chapter has practice questions
to help you test your comprehension of the material in the chapter
• Post-assessment exam Use this as a practice exam to test your
comprehension of the subject matter and readiness to take the actual exam
It’s OK if you do the practice questions in a different order You may decide totackle all the chapters in the book and then do the pre-assessment and post-
assessment questions That’s fine However, I strongly suggest you review all the
questions in the book Also, make sure you check out the additional free online
• Glossary terms Important glossary items are presented in bold italics
the first time they are mentioned, and/or when they are defined Theobjectives include an extensive Security+ Acronyms list Some of these are
Trang 33relevant to the current exam, so I’ve included them in Appendix A,
“Glossary.” However, irrelevant acronyms are not included in the Glossary
• Commands Some chapters include specific commands that I encourage
you to enter so that you can see how they work These are shown in bold.
• File names File names such as md5sum.exe are shown in italics.
• Web site URLs URLs such as http:/gcgapremium.com are shown in
italics
Remember This
Throughout the book, you’ll see text boxes that highlight important informationyou should remember to successfully pass the exam The surrounding contentprovides the additional information needed to fully understand these key points, andthe text boxes summarize the important points
||||||||||||||||||||
Trang 34These textboxes will look like this:
A tried-and-true method of repeating key information is to take notes whenyou’re first studying the material and then rewrite the notes later This will expose
you to the material a minimum of three times
Another method that students have told me has been successful for them is touse an MP3 player Many MP3 players can record Start your MP3 recorder and
read the information in each text box for a chapter and the information in the Exam
Topic Review section of each chapter Save the MP3 file and regularly listen to it
This allows you to reaffirm the important information in your own voice
You can play it while exercising, walking, or just about any time when it’s notdangerous to listen to any MP3 file You can even burn the MP3 files to a CD and
play them back from a CD player
If the MP3 method is successful for you, you can also record and listen to examquestions Read the question, only the correct answer, and the first sentence or two of
the explanation in each practice question
If you don’t have time to create your own MP3 recordings, check out thecompanion web site (http://gcgapremium.com) for this book You can purchase MP3
recordings there that you can download and use
More and more security devices use Linux as their operating system and this version
of the exam has some specific topics on Linux Command-line tools such as dig,
ifconfig, and ip are a few examples Most mobile devices use either the Apple iOS
operating system or the Android operating system and some of the objectives (such as
rooting and jailbreaking) focus on these operating systems
Trang 35Free Online Resources
There are many additional free resources available to you at
http://gcgapremium.com/501-extras/, including:
• Free online labs
• Sample performance-based questions
• Additional free multiple-choice practice test questions
• Other free resources such as links to additional content
I created this online content with a couple of goals First, this version of theobjectives was
||||||||||||||||||||
Trang 36significantly longer than the last version There was a lot I wanted to include in the
book, but there just wasn’t room As an example, if I included all the labs in the book, it
would have inflated the page count of the book to an unmanageable level Second, I
wanted to give myself a way to update the book content If it’ll be helpful to readers,
I can easily add additional labs and/or additional resources
These materials are valuable free supplements, so you’ll need to register toaccess this content and prove that you have the book by answering a question As an
example, you may have to answer a question such as this:
Locate the “Vendor Neutral” section in the introduction of the book What isthe last word in that section?
The “Vendor Neutral” section is right before this section (“Free Online
Resources”) and the last word in that section is systems You will then need to
enter the word systems People guessing (or who don’t have the book) won’t be
able to answer the question You will
Be careful, though If you don’t answer the question correctly the first time, youwon’t get another chance for several days It’s important that you take the time to
enter the correct word the first time
Additional Web Resources
Check out http://GetCertifiedGetAhead.com for up-to-date details on theCompTIA Security+ exam This site includes additional information related to the
CompTIA Security+ exam and this book
Although many people have spent a lot of time and energy trying to ensure thatthere are no errors in this book, errors occasionally slip through This site includes
an errata page listing any errors we’ve discovered
If you discover any errors, please let me know through the Contact Us page onthe web site I’d also love to hear about your success when you pass the exam I’m
constantly getting good news from readers and students who are successfully earning
their certifications
In response to all the requests I’ve received for additional materials, such asonline practice test questions, flash cards, and audio files, I created this site:
http://gcgapremium.com/ It includes access to various study materials at an
additional cost Packages include all the materials in the book and in the free online
resources area, plus additional materials such as flash cards, audio, and additional
performance-based questions
Last, I’ve found that many people find cryptography topics challenging, so
Trang 37I’ve posted some videos on YouTube (http://www.youtube.com/) As time allows,I’ll post additional videos, and you can get a listing of all of them by searchingYouTube with “Darril Gibson.”
• “Day-to-day technical information security experience”
• “Broad knowledge of security concerns and implementation, including thetopics in the domain list”
However, I’m aware that two years of experience in a network could meanmany different things Your two years of experience may expose you to differenttechnologies than someone else’s two years of experience
||||||||||||||||||||
Trang 38When it’s critical that you understand an underlying network concept to masterthe relevant exam material, I have often included the concept within the background
information
Set a Goal
Look at a calendar right now and determine the date 45 days from today Thiswill be your target date to take this exam Set this as your goal to complete studying
the materials and to take the exam
This target allows you to master about one and a half chapters per week It may bethat some of the chapters take you less time and some of the chapters take you more
time No problem If you want to modify your target date later, do so However, a
recipe for success in almost any endeavor includes setting a goal
When I teach CompTIA Security+ at a local university, I often help the studentsregister for the exam on the first night They pick a date close to the end of the course
and register I’ve found that when we do this, about 90 percent of the students take
and pass the exam within one week after completing the course On the other hand,
when I didn’t help the students register on the first night, more than half of them did
not complete the exam in the same time frame Setting a goal helps
About the Exam
CompTIA first released the Security+ exam in 2002, and it has quickly grown
in popularity They revised the exam objectives in 2008, 2011, 2014, and again in
2017 The 2017 exam is numbered as SY0-501 The English version of the SY0-401
exam is scheduled to retire in July 2018
Here’s a summary of the exam details:
• Number of questions: Maximum of 90 questions
• Length of test: 90 minutes
• Passing score: 750
• Grading criteria: Scale of 100 to 900 (about 83 percent)
• Question types: Multiple choice and performance-based
• Exam format: Traditional—can move back and forth to view previous
questions
• Exam prerequisites: None required but Network+ is recommended
• Exam test provider: Pearson VUE (https://home.pearsonvue.com/)
Trang 39Passing Score
A score of 750 is required to pass This is on a scale of 100 to 900 If you takethe exam but don’t get a single question correct, you get a score of 100 If you getevery question correct, you get a score of 900 A passing score of 750 divided by
900 equals.8333 or 83.33 percent
Also, a score of 83 percent is higher than many other certification exams, soyou shouldn’t underestimate the difficulty of this exam However, many peopleregularly pass it and you can pass it, too With this book and the free onlineresources, you will be well prepared
Exam Prerequisites
All that is required for you to take the exam is money Other than that, there are
no enforced prerequisites However, to successfully pass the exam, you’reexpected to have “a minimum of
||||||||||||||||||||
Trang 40two years’ of experience in IT administration with a focus on security.” If you have
more than that, the exam materials will likely come easier to you If you have less, the
exam may be more difficult
Beta Questions
Your exam may have some beta questions They aren’t graded but instead areused to test the validity of the questions If everyone gets a beta question correct, it’s
probably too easy If everyone gets it incorrect, there’s probably something wrong
with the question After enough people have tested a beta question, CompTIA
personnel analyze it and decide if they want to add it to the test bank, or rewrite and
test it as a new beta question
The good news is that CompTIA doesn’t grade the beta questions However,you don’t know which questions are ungraded beta questions and which questions
are live questions, so you need to treat every question equally
Exam Format
The exam uses a traditional format You start at question 1 and go to the lastquestion During the process, you can skip questions and mark any questions you
want to review when you’re done Additionally, you can view previous questions if
desired For example, if you get to question 10 and then remember something that
helps you answer question 5, you can go back and redo question 5
include a phrase such as “Select TWO” or “Select THREE.”
You may also see questions that use phrases such as “BEST choice,” “BESTdescription,” or “MOST secure.” In these examples, don’t be surprised if you see
two answers that could answer the question, while only one is the best choice As an
example, consider this simple question:
Q. Which one of the following numbers is between 1 and 10 and is the