Chapter 4Identity and Access Management

THE FOLLOWING COMPTIA SECURITY+ EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER:

  • images 2.2 Given a scenario, use appropriate software tools to assess the security posture of an organization.
    • Protocol analyzer
    • Network scanners: Rogue system detection;
    • Network mapping
    • Wireless scanners/cracker
    • Password cracker
    • Vulnerability scanner
    • Configuration compliance scanner
    • Exploitation frameworks
    • Data sanitization tools
    • Steganography tools
    • Honeypot
    • Backup utilities
    • Banner grabbing
    • Passive vs. active
    • Command line tools: ping; netstat; tracert; nslookup/dig; arp; ipconfig/ip/ifconfig; tcpdump; nmap; netcat
  •  2.3 Given a ...

Get CompTIA Security+ Study Guide, 7th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.