Mike walks through several scenarios to consider when protecting a network, including how they could block access to services.
- Let's take a look at some scenario situations…that you'll probably run into on the exam.…Now, keep in mind that,…because scenarios are so important for the exam,…the CompTIA is very much capable of taking…something that looks really, really complicated,…and really breaking it down…into something incredibly simple.…Here's a case in point.…What I've drawn up here is a fairly typical network.…You'll see that I've got some firewall that's also a router…that's out to the internet.…
I've got some first level devices here,…some servers, a wireless access point.…And then, beneath that, I've got another NATed router…that's connecting to this one particular system.…When you're running into situations…where you can't get to somebody else,…the first thing you need to consider is the idea…that you have blocked TCP or UDP ports…somewhere in the setup.…Now, when we're talking about blocked ports,…it could be anything, so, for this scenario,…I'm just gonna say Port 80, but it really depends…on what the scenario says…you need to be able to be ready about.…
We are a CompTIA Content Publishing Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
- What is risk management?
- Managing change to a network
- Mitigating network threats
- Training users
- Denial of service and social engineering attacks
- Hardening devices
- Testing network security
- Network monitoring
- Security information and event management (SIEM) tools