Options

I passed security+ but...

epanidouepanidou Member Posts: 2 ■□□□□□□□□□
I passed it last Wednesday with 812, but during the exam I was affraid that I wouldn't make it...

in my opinion:

1. the exam is really hard
2. some questions and answers are not clear
3. not enough time to read it carefully
4. scan it and don't try to understand it fully
5. mark it for review if in doubt
6. strangly, but I didn't have questions about port numbers (just 1, maybe 2 - DNS)
7. very little about wireless despite what others are saying

Comments

  • Options
    mobri09mobri09 Users Awaiting Email Confirmation Posts: 723
  • Options
    RussSRussS Member Posts: 2,068 ■■■□□□□□□□
    Congrats icon_thumright.gif
    www.supercross.com
    FIM website of the year 2007
  • Options
    FijianTribeFijianTribe Member Posts: 62 ■■□□□□□□□□
    Congrats. On the questions asked, it seems really wierd, maybe there are just a lot of questions CompTIA has to randomize on, becuase it doesnt seem like to many people get hit in the exact same areas from their postings, or maybe its just their memory of the test and what stood out the most.

    Looks like Im going to be taking this test tomorrow 8am PST, Congrats again!
  • Options
    janmikejanmike Member Posts: 3,076
    Congratulations!
    "It doesn't matter, it's in the past!"--Rafiki
  • Options
    D-boyD-boy Member Posts: 595
  • Options
    epanidouepanidou Member Posts: 2 ■□□□□□□□□□
    I have to agree on that...some are saying that there is a pool of 800 questions so it's your luck I guess....in my case it wasn't easy....I was hoping that I will help myself with questions about port numbers as I have memorized all of them but that was not the case....sure, there were some easy questions, simillar to the ones on different sites but they were just few...I am not an expert in this field (and woman :D) and most of the material was just simply a theory, so I had to use some logic while answering these questions

    what I remember:
    1. disabling mail relaying Unix ("dot" in the end - read carefully notes on this excelent site)
    2. reverse lookups as another protection in similar question
    3. physical security bariers- camera, motion detector, guard (I chose guard although all of these pertain physical security)
    4. key length in SSL (40, 12icon_cool.gif
    5. intrusion detection-false positive
    6. confidentiality, integrity, availability but in a tricky way
    7. recognize which are asymmetric and symmetric algorithms
    8. non-repudiation
    9. allowing anonymous FTP and its repercusions (but from different than security side: more uploads and downloads?, changes in user profiles, directories)
    10. CGI - buffer overflow
    11. instant messengers - social enginering used there
    12. few questions on attacks and how to distinguish them
    13. routers and ingress filters
    14. attacks on HASHED PASSWORDS!!!
    15. attacks: footprinting and fingerprinting in 2 questions
    16. people are the weakest link
    17. biometrics most expensive
    18. few questions on access control : separation od duties, need to know, security levels and labels
    19. examples of smart cards, what is not
    20. malicious code, virus, logic bomb, warm - differences, distinguish them
    21. WTLS - model, elements, privacy, integrity, war driving
    22.ISAKMP - it does not establish session keys
    23. PLEASE READ CAREFULLY NOTES ON THIS WEBSITE.... JOHAN DID AN EXCELLENT JOB!!!!! - a huge THANK YOU!!!
  • Options
    JuddJudd Member Posts: 132
    epanidou wrote:
    what I remember:
    1. disabling mail relaying Unix ("dot" in the end - read carefully notes on this excelent site)
    2. reverse lookups as another protection in similar question
    3. physical security bariers- camera, motion detector, guard (I chose guard although all of these pertain physical security)
    4. key length in SSL (40, 12icon_cool.gif
    5. intrusion detection-false positive
    6. confidentiality, integrity, availability but in a tricky way
    7. recognize which are asymmetric and symmetric algorithms
    8. non-repudiation
    9. allowing anonymous FTP and its repercusions (but from different than security side: more uploads and downloads?, changes in user profiles, directories)
    10. CGI - buffer overflow
    11. instant messengers - social enginering used there
    12. few questions on attacks and how to distinguish them
    13. routers and ingress filters
    14. attacks on HASHED PASSWORDS!!!
    15. attacks: footprinting and fingerprinting in 2 questions
    16. people are the weakest link
    17. biometrics most expensive
    18. few questions on access control : separation od duties, need to know, security levels and labels
    19. examples of smart cards, what is not
    20. malicious code, virus, logic bomb, warm - differences, distinguish them
    21. WTLS - model, elements, privacy, integrity, war driving
    22.ISAKMP - it does not establish session keys
    23. PLEASE READ CAREFULLY NOTES ON THIS WEBSITE.... JOHAN DID AN EXCELLENT JOB!!!!! - a huge THANK YOU!!!
    What an excellent reference your post is!! I am taking a 6 credit IS course right now and I immediately noticed things we have covered. Perhaps I'll get a study guide after the class an tackle Security+ next.
  • Options
    TURTLEGIRLTURTLEGIRL Member Posts: 361
    CONGRATULATIONS :D
    If you don't know 24 then you don't know Jack!
Sign In or Register to comment.