flav2000 wrote: » Hi everyone, I just came across this resource 3 days ago. It has been valuable. Thank you. I am writing the exam tomorrow ( Oct. 28 ) and I have been re-studying for the better part of two weeks. I initially took an instructor-based course late last year and due to various circumstances I only got around to facing the exam now. I have gone through quite a few practice exams and usually score in the 80-90% range for them. So I am semi-confident I would pass. However, last night I came across the ExamCram book by Diane Barrett; Kalani K. Hausman; Martin Weiss (available electronically through the local library) and my score on its test is only in the 70-80% range which surprises me. When I re-read the questions I found the writing to be convoluted and some of the answers can be argued one way or the other. So, I wonder if anybody else has some experience with this book and if the type of questions they ask is in line with the actual Security+ exam. Example question: Which of the following criteria is not a common criterion to authenticate a valid access request? A. Something you have B. Where you logon C. What you know D. Something you do E. Something you are Their answer is B. Their explanation is that location is rule-based and does not provide authentication. And "Something you do" they gave an example of "written signature", which seem to be outside of the usual Security+ scope of Something you "have/are/know". I mostly agree with their provided answer "after" I have reach the key but at the time of the question it seems it could go one way or another. Anyways, thanks in advance for any comments! Taht should help greatly for the final 24 hour push.:D
flav2000 wrote: » Hi everyone, Example question: Which of the following criteria is not a common criterion to authenticate a valid access request? A. Something you have B. Where you logon C. What you know D. Something you do E. Something you are Their answer is B. Their explanation is that location is rule-based and does not provide authentication. And "Something you do" they gave an example of "written signature", which seem to be outside of the usual Security+ scope of Something you "have/are/know". I mostly agree with their provided answer "after" I have reach the key but at the time of the question it seems it could go one way or another. Anyways, thanks in advance for any comments! Taht should help greatly for the final 24 hour push.:D
flav2000 wrote: » Reading the objectives and the notes again, I saw some mention of port numbers and a sprinkling of questions about the key/block size of various crypto algorithms. I remember some of those but wonder if I should spend the extra effort on it. From where I stand it seems like a disservice to ask about these minute details when there are more important conceptual questions to be asked on the exam.
Darril wrote: » Even if it's not on the exam, it will had to your foundation of knowledge and often help you later in your travels.
dynamik wrote: » Fo' shizzle. Your goal should be to learn the material; the piece of paper is just icing on the cake.
dynamik wrote: » How are ports not useful information? That's Networking 101. Load up a simple server and configure FTP, Telnet, SSH, VNC, HTTP(S), etc., and tinker with the firewall. Do some banner grabbing with Netcat. There are numerous ways to apply that material.
flav2000 wrote: » On the other hand, knowledge about baseline activity, what kind of IDS one should use and where to deploy them would seem like much more important IMO. QUOTE]
dynamik wrote: » Dude, you only need a few dozen of the popular ones, not 2048
veritas_libertas wrote: » Don't you mean 1024? That would be the common ports, 0-1023.List of TCP and UDP port numbers - Wikipedia, the free encyclopedia
Darril wrote: » On IDSs, where I currently work, the use of IDSs has increased quite a bit. We currently use both signature-based and anomaly-based NIDS and have a HIDS installed on every desktop. Additionally, I've talked to some trainers that train vendor specific IDS classes, and they've said that the popularity of the IDS classes has skyrocketed. All of this reflects the increased security within organizations. I wrote this blog a while ago that includes details on the different types of IDSs,m including pros and cons, and where they are deployed:Security Plus: Get Certified Get Ahead: Intrusion Detection Systems (HIDS and NIDS) Darril Gibson Author: CompTIA Security+: Get Certified Get Aheadwww.sy0-201.com Security+ BlogSecurity Plus: Get Certified Get Ahead Security+ Tip of day Tweets twitter.com/DarrilGibson flav2000 wrote: » On the other hand, knowledge about baseline activity, what kind of IDS one should use and where to deploy them would seem like much more important IMO. QUOTE]
flav2000 wrote: » I was the one who said 2048. Technically, not all services operate on both UDP and TCP. Some operates on both, some one or the other. Hence, if you want to know every bit it'll be 2048.