Skip to content
Pass Microsoft, Cisco, Sap and Salesforce Exams
Menu
  • Home
  • Exams
  • Certifications
  • Cloud Computing
  • Cyber Security
  • Contact Us
  • Log in
  • Sign up
Menu

Author: examcert

Types of Firewalls – 100-150 Exam Study Guide

Posted on 2024-10-112024-09-09 by examcert

Types of Firewalls (39.5.2)It is important to understand the different types of firewalls and their specific capabilities so that the right firewall is used for each situation. Packet Filtering (Stateless) FirewallPacket filtering firewalls are usually part of a router firewall, which permits or denies traffic based on Layer 3 and Layer 4 information, as shown…

Read more

Network-Based Malware Protection

Posted on 2024-10-102024-09-09 by examcert

Network-Based Malware Protection (39.4.4) New security architectures for the borderless network address security challenges by having endpoints use network scanning elements. These devices provide many more layers of scanning than a single endpoint possibly could, as shown in Figure 39-10. Network-based malware prevention devices are also capable of sharing information among themselves to make better-informed…

Read more

Host-Based Malware Protection

Posted on 2024-10-102024-09-09 by examcert

Host-Based Malware Protection (39.4.3)The network perimeter is always expanding. People access corporate network resources with mobile devices that use remote-access technologies such as VPN. These same devices are also used on unsecured, or minimally secured, public and home networks. Host-based antimalware/antivirus software and host-based firewalls are used to protect these devices. Antivirus/Antimalware SoftwareThis is software…

Read more

Antimalware Protection – 100-150 Exam Study Guide

Posted on 2024-10-092024-09-09 by examcert

Antimalware Protection (39.4) Malware, is short for “malicious software.” Malware is any type of software that is specifically designed to damage, disrupt, or gain unauthorized access to end devices or networks. The intent of malware is to steal sensitive information, compromise system functionality, or perform other harmful actions Endpoint Threats (39.4.1) The term “endpoint” is…

Read more

What Is Boot Integrity? – 100-150 Exam Study Guide

Posted on 2024-10-092024-09-09 by examcert

What Is Boot Integrity? Boot integrity ensures that the system can be trusted and has not been altered while the operating system loads. Firmware—software instructions about basic computer functions—is stored on a small memory chip on the motherboard. The basic input/output system (BIOS) is the first program that runs when you turn on the computer….

Read more

Host Intrusion Detection Systems (HIDSs)

Posted on 2024-10-082024-09-09 by examcert

Host Intrusion Detection Systems (HIDSs) HIDS software is installed on a device or server to monitor suspicious activity. It monitors system calls and file system access to detect malicious requests. It can also monitor configuration information about the device that is held in the system registry. A HIDS stores all log data locally. It is…

Read more

Patch Management – 100-150 Exam Study Guide

Posted on 2024-10-082024-09-09 by examcert

Patch Management (39.3.4)Cybercriminals work relentlessly to exploit weakness in computer systems. To stay one step ahead, keep systems secure and up to date by regularly installing patches. What Are Patches?Patches are code updates that prevent a new virus, worm, or other malware from making a successful attack. Patches and upgrades are often combined into a…

Read more

Check Your Understanding—Access Control

Posted on 2024-10-072024-09-09 by examcert

Check Your Understanding—Access Control (39.2.12)Refer to the online course to complete this activity. Video—Configure Access Control (39.2.13)Refer to the online course to view this video. Packet Tracer—Configure Access Control (39.2.14)In the following Packet Tracer activity, you will complete the following objectives: Refer to the online course to complete this Packet Tracer. Defending Systems and Devices…

Read more

Multi-Factor Authentication

Posted on 2024-10-072024-09-09 by examcert

Multi-Factor Authentication (39.2.9) As we’ve touched upon earlier, multi-factor authentication uses at least two methods of verification—such as a password and something you have, for example, a security key fob. This can be taken a step further by adding something you are, such as a fingerprint scan. Multi-factor authentication can reduce the incidence of online…

Read more

Who You Are – 100-150 Exam Study Guide

Posted on 2024-10-072024-09-09 by examcert

Who You AreEach person has unique physical characteristics, such as a fingerprint, retina pattern, or voice print. These personal biometric characteristics uniquely identify a specific person. Biometric security compares physical characteristics against stored profiles to authenticate users. In this case, a profile is a data file containing known characteristics of an individual. The system grants…

Read more
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 40
  • Next

Categories

  • 100-150 Study Course
  • AWS Study Course
  • AZ-104 Study Course
  • Certified Advanced Salesforce Admin
  • Cisco Study Course
  • CLF-C02 Study Course
  • Google
  • Google Associate Cloud Engineer
  • Microsoft Study Course
  • Salesforce
  • Study Course
© 2024 Zeusexam, Inc. All rights reserved. | Privacy Statement | Terms of Use | Use of Cookies | Trust | Accessibility | Cookie Preferences | Your Privacy Choices