Security Plus Exam Cram Handout
Security Plus Exam Cram Handout
1,000 flashcards
1,000 practice questions
2 practice exams
SECURITY+
EXAM STUDY GUIDE
& PRACTICE TESTS BUNDLE
Subscribed
SUBSCRIBE
about this series…
device
A common technique is the
expression mnemonic aka
MNEMONIC an acronym
device
The best mnemonic devices are
simple, relevant, and visual
MNEMONIC
device
We’ll start with an example
using a first letter mnemonic
MNEMONIC
device
THE OSI MODEL
Away 7 Application All
Throw 4 Transport To
|
Not 3 Network Need
Toss 4 Transport To
|
Not 3 Network Need
2 Response
3 Mitigation
4 Reporting
|
5 Recovery
6 Remediation
7 Lessons Learned
INCIDENT MANAGEMENT framework
1 Detection
DRMRRRL
2 Response
3 Mitigation
4 Reporting
|
5 Recovery
6 Remediation
7 Lessons Learned
INCIDENT MANAGEMENT framework
1 Detection
DRMRRRL
2 Response
3 Mitigation
4 Reporting
|
5 Recovery
6 Remediation
7 Lessons Learned
Chunking is a technique of
breaking info into smaller
MNEMONIC pieces that make sense
device
chunking
cryptography
Asymmetric Hashes
Block ciphers
Symmetric
20 min
THE POWER OF
REPETITION
spaced repetition
100 Spaced Repetition
Forgetting curve
PRACTICE POWERPOINT
EXAM REVIEW
MEMORIZING VS UNDERSTANDING
• Redundancy • Power
• Geographic dispersal • Uninterruptible
• Disk • power supply (UPS)
• Redundant array of • Generator
• inexpensive disks (RAID) • Dual supply
levels • Managed power
• Multipath • distribution units (PDU
• Network • Replication
• Load balancers • Storage area network
• Network interface card • VM
(NIC) teaming • On-premises vs. cloud
• Steganography • Limitations
• Audio • Speed
• Video • Size
• Image • Weak keys
• Homomorphic • Time
encryption • Longevity
• Common use cases • Predictability
• Low power devices • Reuse
• Low latency • Entropy
• High resiliency • Computational overheads
• Supporting confidentiality • Resource vs. security
• Supporting integrity constraints
• Supporting obfuscation
• Supporting authentication symmetric & asymmetric algorithms work together
• Supporting non-repudiation
to solve for these! More in the DOMAIN 2 lesson!
• 3.0 Implementation
3.0 implementation
3.1 Given a scenario, implement secure protocols
OTHER EXAMS?
INSIDE CLOUD
THANKS
F O R W A T C H I N G!