Chapter 8. Security Policies and Procedures
THE FOLLOWING COMPTIA SECURITY+ EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER:
3.2 Explain common access control models and the differences between each.
MAC
DAC
Role and Rule based access control
3.6 Summarize the various authentication models and identify the components of each.
One, two, and three-factor authentication
Single sign-on
4.6 Execute proper logging procedures and evaluate the results.
Security application
DNS
Firewall
Antivirus
4.7 Conduct periodic audits of system security settings.
User access and rights review
Storage and retention policies
6.1 Explain redundancy planning and its components.
Hot site
Cold site
Warm Site
Backup generator
Single point of failure
RAID
Spare parts
Redundant servers
Redundant ISP ...
Get CompTIA Security+™: Study Guide, Fourth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.