Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Dedication
Acknowledgments
About the Author
Introduction
Who This Book Is For
About This Book
How to Use This Book
Conventions
Remember This
Vendor Neutral
Free Online Resources
Additional Web Resources
Assumptions
Set a Goal
About the Exam
Passing Score
Exam Prerequisites
Beta Questions
Exam Format
Question Types
Multiple Choice
Performance-Based Questions
Question Complexity
Video
Exam Test Provider
Voucher Code for 10 Percent Off
Exam Domains
Objective to Chapter Map
1.0 Threats, Attacks and Vulnerabilities 21%
2.0 Technologies and Tools 22%
3.0 Architecture and Design 15%
4.0 Identity and Access Management 16%
5.0 Risk Management 14%
6.0 Cryptography and PKI 12%
Recertification Requirements
Pre-Assessment Exam
Assessment Exam Answers
Chapter 1 Mastering Security Basics
Understanding Core Security Goals
What Is a Use Case?
Ensure Confidentiality
Encryption
Access Controls
Steganography and Obfuscation
Provide Integrity
Hashing
Digital Signatures, Certificates, and Non-Repudiation
Increase Availability
Redundancy and Fault Tolerance
Patching
Resource Versus Security Constraints
Introducing Basic Risk Concepts
Understanding Control Types
Technical Controls
Administrative Controls
Physical Controls
Control Goals
Preventive Controls
Detective Controls
Comparing Detection and Prevention Controls
Corrective Controls
Deterrent Controls
Compensating Controls
Combining Control Types and Goals
Implementing Virtualization
Comparing Hypervisors
Application Cell or Container Virtualization
Secure Network Architecture
Snapshots
VDI/VDE and Non-Persistence
VMs as Files
Risks Associated with Virtualization
Running Kali Linux in a VM
Using Command-Line Tools
Windows Command Line
Linux Terminal
Understanding Switches and Getting Help
Understanding Case
Ping
Using Ping to Check Name Resolution
Beware of Firewalls
Using Ping to Check Security Posture
Ipconfig, ifconfig, and ip
Netstat
Tracert
Arp
Chapter 1 Exam Topic Review
Chapter 1 Practice Questions
Chapter 1 Practice Question Answers
Chapter 2 Understanding Identity and Access Management
Exploring Authentication Concepts
Comparing Identification and AAA
Comparing Authentication Factors
Something You Know
Something You Have
Something You Are
Somewhere You Are
Dual-Factor and Multifactor Authentication
Summarizing Identification Methods
Troubleshooting Authentication Issues
Comparing Authentication Services
Kerberos
NTLM
LDAP and LDAPS
Single Sign-On
Managing Accounts
Least Privilege
Need to Know
Account Types
Require Administrators to Use Two Accounts
Standard Naming Convention
Prohibiting Shared and Generic Accounts
Disablement Policies
Recovering Accounts
Time-of-Day Restrictions
Expiring Accounts and Recertification
Account Maintenance
Credential Management
Comparing Access Control Models
Role-Based Access Control
Using Roles Based on Jobs and Functions
Documenting Roles with a Matrix
Establishing Access with Group-Based Privileges
Rule-Based Access Control
Discretionary Access Control
SIDs and DACLs
The Owner Establishes Access
Beware of Trojans
Mandatory Access Control
Labels and Lattice
Establishing Access
Attribute-Based Access Control
Chapter 2 Exam Topic Review
Chapter 2 Practice Questions
Chapter 2 Practice Question Answers
Chapter 3 Exploring Network Technologies and Tools
Reviewing Basic Networking Concepts
Basic Networking Protocols
Implementing Protocols for Use Cases
Voice and Video Use Case
File Transfer Use Case
Email and Web Use Cases
Directory Services Use Case
Remote Access Use Cases
Time Synchronization Use Case
Network Address Allocation Use Case
Domain Name Resolution Use Case
Subscription Services Use Case
Understanding and Identifying Ports
Combining the IP Address and the Port
IP Address Used to Locate Hosts
Server Ports
Client Ports
Putting It All Together
The Importance of Ports in Security
Understanding Basic Network Devices
Switches
Security Benefit of a Switch
Port Security
Physical Security of a Switch
Loop Prevention
Flood Attacks and Flood Guards
Routers
Routers and ACLs
Implicit Deny
Antispoofing
Bridge
Aggregation Switch
Firewalls
Host-Based Firewalls
Application-Based Versus Network-Based Firewalls
Stateless Firewall Rules
Stateful Versus Stateless
Web Application Firewall
Implementing a Secure Network
Zones and Topologies
DMZ
Understanding NAT and PAT
Network Separation
Physical Isolation and Airgaps
Logical Separation and Segmentation
Comparing a Layer 2 Versus Layer 3 Switch
Isolating Traffic with a VLAN
Media Gateway
Proxy Servers
Caching Content for Performance
Transparent Proxy Versus Nontransparent Proxy
Reverse Proxy
Application Proxy
Mail Gateways
Summarizing Routing and Switching Use Cases
Chapter 3 Exam Topic Review
Chapter 4 Securing Your Network
Exploring Advanced Security Devices
Understanding IDSs and IPSs
HIDS
NIDS
Sensor and Collector Placement
Detection Methods
Data Sources and Trends
Reporting Based on Rules
False Positives Versus False Negatives
IPS Versus IDS—Inline Versus Passive
SSL/TLS Accelerators
SSL Decryptors
Honeypots
Honeynets
IEEE 802.1x Security
Securing Wireless Networks
Reviewing Wireless Basics
Fat Versus Thin Access Points
Band Selection and Channel Widths
Access Point SSID
Disable SSID Broadcasting or Not
Enable MAC Filtering
Antenna Types and Placement
Antenna Power and Signal Strength
Network Architecture Zones
Wireless Cryptographic Protocols
WPA
WPA2
TKIP Versus CCMP
PSK, Enterprise, and Open Modes
Authentication Protocols
Captive Portals
Understanding Wireless Attacks
Disassociation Attacks
WPS and WPS Attacks
Rogue AP
Evil Twin
Jamming Attacks
IV Attacks
NFC Attacks
Bluetooth Attacks
Wireless Replay Attacks
RFID Attacks
Misconfigured Access Points
Using VPNs for Remote Access
VPNs and VPN Concentrators
Remote Access VPN
IPsec as a Tunneling Protocol
TLS as a Tunneling Protocol
Split Tunnel Versus Full Tunnel
Site-to-Site VPNs
Always-On VPN
Network Access Control
Host Health Checks
Permanent Versus Dissolvable
Identity and Access Services
PAP
CHAP
MS-CHAP and MS-CHAPv2
RADIUS
TACACS+
Diameter
AAA Protocols
Chapter 4 Exam Topic Review
Chapter 4 Practice Questions
Chapter 5 Securing Hosts and Data
Implementing Secure Systems
Operating Systems
Secure Operating System Configurations
Using Master Images
Resiliency and Automation Strategies
Secure Baseline and Integrity Measurements
Patch Management
Change Management Policy
Unauthorized Software and Compliance Violations
Application Whitelisting and Blacklisting
Secure Staging and Deployment
Sandboxing with VMs
Sandboxing with Chroot
Secure Staging Environment
Peripherals
Hardware and Firmware Security
EMI and EMP
FDE and SED
UEFI and BIOS
Trusted Platform Module
Hardware Security Module
Summarizing Cloud Concepts
Software as a Service
Platform as a Service
Infrastructure as a Service
Security Responsibilities with Cloud Models
Security as a Service
Cloud Deployment Models
Deploying Mobile Devices Securely
Deployment Models
Connection Methods
Mobile Device Management
Mobile Device Enforcement and Monitoring
Unauthorized Software
Hardware Control
Unauthorized Connections
Exploring Embedded Systems
Security Implications and Vulnerabilities
Comparing Embedded Systems
Protecting Data
Protecting Confidentiality with Encryption
Database Security
File System Security
Data Loss Prevention
Removable Media
Data Exfiltration
Cloud-Based DLP
Chapter 5 Exam Topic Review
Chapter 5 Practice Questions
Chapter 5 Practice Question Answers
Chapter 6 Comparing Threats, Vulnerabilities, and Common Attacks
Understanding Threat Actors
Determining Malware Types
Viruses
Worms
Logic Bombs
Backdoors
Trojans
RAT
Ransomware
Keylogger
Spyware
Adware
Bots and Botnets
Rootkits
Recognizing Common Attacks
Social Engineering
Impersonation
Shoulder Surfing
Tricking Users with Hoaxes
Tailgating and Mantraps
Dumpster Diving
Watering Hole Attacks
Attacks via Email and Phone
Spam
Phishing
Spear Phishing
Whaling
Vishing
One Click Lets Them In
Blocking Malware and Other Attacks
Protecting Systems from Malware
Antivirus and Anti-Malware Software
Data Execution Prevention
Advanced Malware Tools
Spam Filters
Educating Users
New Viruses
Phishing Attacks
Zero-Day Exploits
Why Social Engineering Works
Authority
Intimidation
Consensus
Scarcity
Urgency
Familiarity
Trust
Chapter 6 Exam Topic Review
Chapter 6 Practice Questions
Chapter 6 Practice Question Answers
Chapter 7 Protecting Against Advanced Attacks
Comparing Common Attacks
DoS Versus DDoS
Privilege Escalation
Spoofing
SYN Flood Attacks
Man-in-the-Middle Attacks
ARP Poisoning Attacks
DNS Attacks
DNS Poisoning Attacks
Pharming Attacks
DDoS DNS Attacks
Amplification Attacks
Password Attacks
Brute Force Attacks
Dictionary Attacks
Password Hashes
Pass the Hash Attacks
Birthday Attacks
Rainbow Table Attacks
Replay Attacks
Known Plaintext Attacks
Hijacking and Related Attacks
Domain Hijacking
Man-in-the-Browser
Driver Manipulation
Zero-Day Attacks
Memory Buffer Vulnerabilities
Memory Leak
Integer Overflow
Buffer Overflows and Buffer Overflow Attacks
Pointer Dereference
DLL Injection
Summarizing Secure Coding Concepts
Compiled Versus Runtime Code
Proper Input Validation
Client-Side and Server-Side Input Validation
Other Input Validation Techniques
Avoiding Race Conditions
Proper Error Handling
Cryptographic Techniques
Code Reuse and SDKs
Code Obfuscation
Code Quality and Testing
Development Life-Cycle Models
Secure DevOps
Version Control and Change Management
Provisioning and Deprovisioning
Identifying Application Attacks
Web Servers
Database Concepts
Normalization
SQL Queries
Injection Attacks
Cross-Site Scripting
Cross-Site Request Forgery
Understanding Frameworks and Guides
Chapter 7 Exam Topic Review
Chapter 7 Practice Questions
Chapter 7 Practice Question Answers
Chapter 8 Using Risk Management Tools
Understanding Risk Management
Threats and Threat Assessments
Vulnerabilities
Risk Management
Risk Assessment
Risk Registers
Supply Chain Assessment
Comparing Scanning and Testing Tools
Checking for Vulnerabilities
Password Crackers
Network Scanners
Banner Grabbing
Vulnerability Scanning
Credentialed Versus Non-Credentialed
Configuration Compliance Scanner
Obtaining Authorization
Penetration Testing
Passive Reconnaissance
Active Reconnaissance
Initial Exploitation
Escalation of Privilege
Pivot
Persistence
White, Gray, and Black Box Testing
Intrusive Versus Non-Intrusive Testing
Passive Versus Active Tools
Exploitation Frameworks
Using Security Tools
Sniffing with a Protocol Analyzer
Command-Line Tools
Tcpdump
Nmap
Netcat
Monitoring Logs for Event Anomalies
Operating System Event Logs
Firewall and Router Access Logs
Linux Logs
Other Logs
SIEM
Continuous Monitoring
Usage Auditing and Reviews
Permission Auditing and Review
Chapter 8 Exam Topic Review
Chapter 8 Practice Questions
Chapter 8 Practice Question Answers
Chapter 9 Implementing Controls to Protect Assets
Implementing Defense in Depth
Comparing Physical Security Controls
Using Signs
Comparing Door Lock Types
Securing Door Access with Cipher Locks
Securing Door Access with Cards
Securing Door Access with Biometrics
Tailgating
Preventing Tailgating with Mantraps
Increasing Physical Security with Guards
Monitoring Areas with Cameras
Fencing, Lighting, and Alarms
Securing Access with Barricades
Using Hardware Locks
Securing Mobile Computers with Cable Locks
Securing Servers with Locking Cabinets
Securing Small Devices with a Safe
Asset Management
Implementing Environmental Controls
Heating, Ventilation, and Air Conditioning
Hot and Cold Aisles
HVAC and Fire
Fire Suppression
Environmental Monitoring
Shielding
Protected Cabling
Protected Distribution of Cabling
Faraday Cage
Adding Redundancy and Fault Tolerance
Single Point of Failure
Disk Redundancies
RAID-0
RAID-1
RAID-5 and RAID-6
RAID-10
Server Redundancy and High Availability
Failover Clusters for High Availability
Load Balancers for High Availability
Clustering Versus Load Balancing
Power Redundancies
Protecting Data with Backups
Comparing Backup Types
Full Backups
Restoring a Full Backup
Differential Backups
Order of Restoration for a Full/Differential Backup Set
Incremental Backups
Order of Restoration for a Full/Incremental Backup Set
Choosing Full/Incremental or Full/Differential
Snapshot Backup
Testing Backups
Protecting Backups
Backups and Geographic Considerations
Comparing Business Continuity Elements
Business Impact Analysis Concepts
Impact
Privacy Impact and Threshold Assessments
Recovery Time Objective
Recovery Point Objective
Comparing MTBF and MTTR
Continuity of Operations Planning
Recovery Sites
Order of Restoration
Disaster Recovery
Testing Plans with Exercises
Chapter 9 Exam Topic Review
Chapter 9 Practice Question Answers
Chapter 10 Understanding Cryptography and PKI
Introducing Cryptography Concepts
Providing Integrity with Hashing
MD5
SHA
HMAC
RIPEMD
Hashing Files
Hashing Passwords
Key Stretching
Hashing Messages
Using HMAC
Providing Confidentiality with Encryption
Encryption Terms
Block Versus Stream Ciphers
Cipher Modes
Symmetric Encryption
AES
DES
3DES
RC4
Blowfish and Twofish
Symmetric Encryption Summary
Asymmetric Encryption
The Rayburn Box
The Rayburn Box Used to Send Secrets
The Rayburn Box Used for Authentication
The Rayburn Box Demystified
Certificates
RSA
Static Versus Ephemeral Keys
Elliptic Curve Cryptography
Diffie-Hellman
Steganography
Using Cryptographic Protocols
Protecting Email
Signing Email with Digital Signatures
Encrypting Email
S/MIME
PGP/GPG
HTTPS Transport Encryption
SSL Versus TLS
Encrypting HTTPS Traffic with TLS
Cipher Suites
Implementation Versus Algorithm Selection
Downgrade Attacks on Weak Implementations
Exploring PKI Components
Certificate Authority
Certificate Chaining and Trust Models
Registration and CSRs
Revoking Certificates
Certificate Issues
Public Key Pinning
Key Escrow
Recovery Agent
Comparing Certificate Types
Certificate Formats
Chapter 10 Exam Topic Review
Chapter 10 Practice Questions
Chapter 10 Practice Question Answers
Chapter 11 Implementing Policies to Mitigate Risks
Exploring Security Policies
Personnel Management Policies
Acceptable Use Policy
Mandatory Vacations
Separation of Duties
Job Rotation
Clean Desk Policy
Background Check
NDA
Exit Interview
Onboarding
Policy Violations and Adverse Actions
Other General Security Policies
Agreement Types
Protecting Data
Information Classification
Data Sensitivity Labeling and Handling
Data Destruction and Media Sanitization
Data Retention Policies
PII and PHI
Protecting PII and PHI
Legal and Compliance Issues
Data Roles and Responsibilities
Responding to Incidents
Incident Response Plan
Incident Response Process
Implementing Basic Forensic Procedures
Order of Volatility
Data Acquisition and Preservation of Evidence
Chain of Custody
Legal Hold
Recovery of Data
Active Logging for Intelligence Gathering
Track Man-Hours and Expense
Providing Training
Role-Based Awareness Training
Continuing Education
Training and Compliance Issues
Troubleshooting Personnel Issues
Chapter 11 Exam Topic Review
Chapter 11 Practice Questions
Chapter 11 Practice Question Answers
Post-Assessment Exam
Assessment Exam Answers
Appendix A—Glossary
A
B
C
D
E
F
G
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Z
← Prev
Back
Next →
← Prev
Back
Next →