I passed security+ but...
I passed it last Wednesday with 812, but during the exam I was affraid that I wouldn't make it...
in my opinion:
1. the exam is really hard
2. some questions and answers are not clear
3. not enough time to read it carefully
4. scan it and don't try to understand it fully
5. mark it for review if in doubt
6. strangly, but I didn't have questions about port numbers (just 1, maybe 2 - DNS)
7. very little about wireless despite what others are saying
in my opinion:
1. the exam is really hard
2. some questions and answers are not clear
3. not enough time to read it carefully
4. scan it and don't try to understand it fully
5. mark it for review if in doubt
6. strangly, but I didn't have questions about port numbers (just 1, maybe 2 - DNS)
7. very little about wireless despite what others are saying
Comments
-
FijianTribe Member Posts: 62 ■■□□□□□□□□Congrats. On the questions asked, it seems really wierd, maybe there are just a lot of questions CompTIA has to randomize on, becuase it doesnt seem like to many people get hit in the exact same areas from their postings, or maybe its just their memory of the test and what stood out the most.
Looks like Im going to be taking this test tomorrow 8am PST, Congrats again! -
epanidou Member Posts: 2 ■□□□□□□□□□I have to agree on that...some are saying that there is a pool of 800 questions so it's your luck I guess....in my case it wasn't easy....I was hoping that I will help myself with questions about port numbers as I have memorized all of them but that was not the case....sure, there were some easy questions, simillar to the ones on different sites but they were just few...I am not an expert in this field (and woman ) and most of the material was just simply a theory, so I had to use some logic while answering these questions
what I remember:
1. disabling mail relaying Unix ("dot" in the end - read carefully notes on this excelent site)
2. reverse lookups as another protection in similar question
3. physical security bariers- camera, motion detector, guard (I chose guard although all of these pertain physical security)
4. key length in SSL (40, 12
5. intrusion detection-false positive
6. confidentiality, integrity, availability but in a tricky way
7. recognize which are asymmetric and symmetric algorithms
8. non-repudiation
9. allowing anonymous FTP and its repercusions (but from different than security side: more uploads and downloads?, changes in user profiles, directories)
10. CGI - buffer overflow
11. instant messengers - social enginering used there
12. few questions on attacks and how to distinguish them
13. routers and ingress filters
14. attacks on HASHED PASSWORDS!!!
15. attacks: footprinting and fingerprinting in 2 questions
16. people are the weakest link
17. biometrics most expensive
18. few questions on access control : separation od duties, need to know, security levels and labels
19. examples of smart cards, what is not
20. malicious code, virus, logic bomb, warm - differences, distinguish them
21. WTLS - model, elements, privacy, integrity, war driving
22.ISAKMP - it does not establish session keys
23. PLEASE READ CAREFULLY NOTES ON THIS WEBSITE.... JOHAN DID AN EXCELLENT JOB!!!!! - a huge THANK YOU!!! -
Judd Member Posts: 132epanidou wrote:what I remember:
1. disabling mail relaying Unix ("dot" in the end - read carefully notes on this excelent site)
2. reverse lookups as another protection in similar question
3. physical security bariers- camera, motion detector, guard (I chose guard although all of these pertain physical security)
4. key length in SSL (40, 12
5. intrusion detection-false positive
6. confidentiality, integrity, availability but in a tricky way
7. recognize which are asymmetric and symmetric algorithms
8. non-repudiation
9. allowing anonymous FTP and its repercusions (but from different than security side: more uploads and downloads?, changes in user profiles, directories)
10. CGI - buffer overflow
11. instant messengers - social enginering used there
12. few questions on attacks and how to distinguish them
13. routers and ingress filters
14. attacks on HASHED PASSWORDS!!!
15. attacks: footprinting and fingerprinting in 2 questions
16. people are the weakest link
17. biometrics most expensive
18. few questions on access control : separation od duties, need to know, security levels and labels
19. examples of smart cards, what is not
20. malicious code, virus, logic bomb, warm - differences, distinguish them
21. WTLS - model, elements, privacy, integrity, war driving
22.ISAKMP - it does not establish session keys
23. PLEASE READ CAREFULLY NOTES ON THIS WEBSITE.... JOHAN DID AN EXCELLENT JOB!!!!! - a huge THANK YOU!!!