Profile cover photo
Profile photo
Darril Gibson
157 followers -
Author and trainer
Author and trainer

157 followers
About
Communities and Collections
Posts

Post has attachment
Security+ and Symmetric Encryption Concepts
Symmetric encryption is a type of encryption that uses a single key to encrypt and decrypt data. If you're planning to take the SY0-501 exam, you should have a basic understanding of cryptography concepts such as cipher types and cipher modes. Can you answe...
Add a comment...

Post has attachment
Can you answer this Sample Security+ practice test question?

Q. Which of the following is a symmetric encryption algorithm that encrypts data 1 bit at a time?

A. Block cipher

B. Stream cipher

C. AES

D. DES

E. MD5

Check out the answer and full explanation here.
Add a comment...

Post has attachment
Russian hacking was exposed in a detailed indictment of 12 Russians by the US Department of Justice (DoJ). While reading through it I was intrigued at how the indictment laid out methods that the Russians used in clear and simple English. Read a summary of the attacks here.
Add a comment...

Post has attachment
Can you answer this sample Security+ question?

Q. The Marvin Monroe Memorial Hospital recently suffered a serious attack. The attackers notified management personnel that they encrypted a significant amount of data on the hospital’s servers and it would remain encrypted until the management paid a hefty sum to the attackers. Which of the following identifies the MOST likely threat actor in this attack?

A. Organized crime

B. Ransomware

C. Competitors

D. Hacktivist

Check out the answer and full explanation here.
Add a comment...

Post has attachment
See if you can answer this sample Security+ question.

Q. You are examining a certificate received from a web server used for secure transport encryption. Which of the following items will you be able to see in the certificate. (Choose TWO.)

A. The server’s private key
B. The CAs public key
C. The OID
D. The server’s public key
E. The CSR

Check out the answer (and full explanation) here.
Add a comment...

Post has attachment
Digital Certificates and Security+
Are you planning to take the either the SY0-501 or the SY0-401 version of the Security+ exam? If so, make sure you understand some basics about certificates, including what they contain. As an example, see if you can answer this sample Security+ question. Q...
Add a comment...

Post has attachment
Can you answer this sample Security+ question?

Q. You suspect that an attacker is performing a reconnaissance attack against servers in your organization’s DMZ. The attacker is attempting to gather as much information as possible on these servers. You decide to check the logs of these servers to determine if the attacker is attempting a banner grabbing attack. Which of the following commands MOST likely indicate that the attacker is launching a banner grabbing attack? (Select FOUR.)

A. netcat
B. ipconfig
D. ping
E. arp
F. grep
G. tcpdump
H. nmap
I. telnet

See if you're correct (along with the full explanation) here.
Add a comment...

Post has attachment
Security+ Questions with 8 Possible Answers
Are you preparing for the CompTIA SY0-501 Security+ exam? If so, you might like to that you may see more than just 4 possible answers. Some people are reporting that they're seeing as many as  6 or 8 multiple choice answers in multiple choice questions. And...
Add a comment...

Post has attachment
Baseline Deviations and Security+
Are you planning to take the SY0-401 or SY0-501 Security+ exam? If so, you should understand how baselines can be used to identify changes or deviations. See f you can answer this sample practice test question. Q. Network administrators have identified what...
Add a comment...

Post has attachment
Can you answer this sample Security+ practice test question.

Q. Network administrators have identified what appears to be malicious traffic coming from an internal computer, but only when no one is logged on to the computer.

You suspect the system is infected with malware. It periodically runs an application that attempts to connect to web sites over port 80 with Telnet. After comparing the computer with a list of applications from the master image, you verify this application is very likely the problem.

What allowed you to make this determination?

A. Least functionality
B. Sandbox
C. Blacklist
D. Integrity measurements

Check out this blog post for the answer.
Add a comment...
Wait while more posts are being loaded