Five CompTIA Security+ Review Concepts

#tech - 2 Minute Read

Here are five security concepts that appear in CompTIA Security+ exam objectives.

Unsafe WiFi

What is the difference between a rogue wireless access point (AP), and an "evil twin" AP?

A rogue AP is set up by the company itself (sometimes by mistake) and is not configured properly. It may allow access to network segments that are meant to be protected. An "evil twin" is an access point that was set up by a hacker with the intent to monitor unsuspecting user traffic. Evil twin APs are a common risk in public places like hotels, restaurants and coffee shops.

Authentication types

What are there are three types of computer authentication?

Not to be confused with authorization, authentication is the process that verifies that a person is the person they claim to be. There are three factors of authentication:

  1. Something you know: A password, a secret question.
  2. Something you have: A badge or ID card.
  3. Something you are: Biometrics like a fingerprint or retina scan.

Least privilege

What is the most important concept to follow when creating new accounts?

The practice of providing least privilege is most important since it limits accounts to only the access necessary to perform their role. This reduces the chances of misused privilege either by accident or by criminal intent.

Digital signatures

In public key infrastructure, what is used to create a digital signature?

A digital signature is a hash digest of the original message, which is then encrypted using the sender's private key. To verify the integrity of the message, the receiver decrypts the signature and compare the resulting hash with its hash of the message. If these match, the message is said to be authentic.

Order of volatility

In what order should digital evidence be collected, based on the order of volatility?

In digital forensics, evidence is collected in an order that gives the best chance of the most comprehensive data recovery. Since the CPU cache and RAM are most volatile (disappearing when the power is off), it's important to collect those first.

From first to last, they are:

  1. Processor Cache (of the CPU).
  2. Random Access Memory (RAM).
  3. Swap File (a portion of hard disk space temporarily used as RAM).
  4. Hard Drive, USB Drive.

Updated May 22, 2020.