O'Reilly logo

CompTIA® Network+® Study Guide, Second Edition by Todd Lammle

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 14

Network Threats and Mitigation

The Following CompTIA Network+ Exam Objectives Are Covered in This Chapter:

  • 5.4 Explain common threats, vulnerabilities, and mitigation techniques.
  • Wireless:
  • War driving
  • War chalking
  • WEP cracking
  • WPA cracking
  • Evil twin
  • Rogue access point
  • Attacks:
  • DoS
  • DDoS
  • Man in the middle
  • Social engineering
  • Virus
  • Worms
  • Buffer overflow
  • Packet sniffing
  • FTP bounce
  • Smurf
  • Mitigation techniques:
  • Training and awareness
  • Patch management
  • Policies and procedures
  • Incident response

It’s true…You’re not paranoid if they really are out to get you. Although “they” probably aren’t after you, personally, your network—no matter the size—is seriously vulnerable, so it’s wise to be very concerned about keeping it secure. Unfortunately, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required