Security+ Part 1
First step in certification
My Study Approach
Every Morning I would study for 30 minutes or more for the exam through the CompTIA Security+ Study Guide and go through any mistake i have made. I will be putting more efforts during the weekend with the below resouces: Allison Youtube ExamCompass Security+ practice exam book
Mistakes
After studying the first 8 chapters of security+ the below are my notes/mistakes I have done in the review questions.
- Threat Assessment is an example of managerial control
- Configuring Intrusion Detection is Technical control
- National state actor has More resources than Insider threat actor
- Powershell is used for fileless malware package
- RAT uses port 80 / 443
- Crypto malware is an example of Ransomeware
- detecting Rootkit can be done by mounting the suspect system on a trusted system
- MD5SUM is used for cracking MD5 hashes
- lowest simpliest of an attack is high risk
- nmap can be used in recon phase
- Rules of engagment contains technical details
- Footprinting is used to discover the operating system
- Active changes happen in development enviroment
- Agile customer satisfaction early
- Elasticity expanding when demand spike
- Tokenization replaces personal ID
- not all crypto key should be kept a secret
- not all cloud services can set account policy
- SMS is least secure
- lower Cross Over Error Rate = lower FRR & lower FAR