Types of Firewalls (39.5.2)It is important to understand the different types of firewalls and their specific capabilities so that the right firewall is used for each situation. Packet Filtering (Stateless) FirewallPacket filtering firewalls are usually part of a router firewall, which permits or denies traffic based on Layer 3 and Layer 4 information, as shown…
Author: examcert
Network-Based Malware Protection
Network-Based Malware Protection (39.4.4) New security architectures for the borderless network address security challenges by having endpoints use network scanning elements. These devices provide many more layers of scanning than a single endpoint possibly could, as shown in Figure 39-10. Network-based malware prevention devices are also capable of sharing information among themselves to make better-informed…
Host-Based Malware Protection
Host-Based Malware Protection (39.4.3)The network perimeter is always expanding. People access corporate network resources with mobile devices that use remote-access technologies such as VPN. These same devices are also used on unsecured, or minimally secured, public and home networks. Host-based antimalware/antivirus software and host-based firewalls are used to protect these devices. Antivirus/Antimalware SoftwareThis is software…
Antimalware Protection – 100-150 Exam Study Guide
Antimalware Protection (39.4) Malware, is short for “malicious software.” Malware is any type of software that is specifically designed to damage, disrupt, or gain unauthorized access to end devices or networks. The intent of malware is to steal sensitive information, compromise system functionality, or perform other harmful actions Endpoint Threats (39.4.1) The term “endpoint” is…
What Is Boot Integrity? – 100-150 Exam Study Guide
What Is Boot Integrity? Boot integrity ensures that the system can be trusted and has not been altered while the operating system loads. Firmware—software instructions about basic computer functions—is stored on a small memory chip on the motherboard. The basic input/output system (BIOS) is the first program that runs when you turn on the computer….
Host Intrusion Detection Systems (HIDSs)
Host Intrusion Detection Systems (HIDSs) HIDS software is installed on a device or server to monitor suspicious activity. It monitors system calls and file system access to detect malicious requests. It can also monitor configuration information about the device that is held in the system registry. A HIDS stores all log data locally. It is…
Patch Management – 100-150 Exam Study Guide
Patch Management (39.3.4)Cybercriminals work relentlessly to exploit weakness in computer systems. To stay one step ahead, keep systems secure and up to date by regularly installing patches. What Are Patches?Patches are code updates that prevent a new virus, worm, or other malware from making a successful attack. Patches and upgrades are often combined into a…
Check Your Understanding—Access Control
Check Your Understanding—Access Control (39.2.12)Refer to the online course to complete this activity. Video—Configure Access Control (39.2.13)Refer to the online course to view this video. Packet Tracer—Configure Access Control (39.2.14)In the following Packet Tracer activity, you will complete the following objectives: Refer to the online course to complete this Packet Tracer. Defending Systems and Devices…
Multi-Factor Authentication
Multi-Factor Authentication (39.2.9) As we’ve touched upon earlier, multi-factor authentication uses at least two methods of verification—such as a password and something you have, for example, a security key fob. This can be taken a step further by adding something you are, such as a fingerprint scan. Multi-factor authentication can reduce the incidence of online…
Who You Are – 100-150 Exam Study Guide
Who You AreEach person has unique physical characteristics, such as a fingerprint, retina pattern, or voice print. These personal biometric characteristics uniquely identify a specific person. Biometric security compares physical characteristics against stored profiles to authenticate users. In this case, a profile is a data file containing known characteristics of an individual. The system grants…