Comptia-Security-Sy0-401 Exam Objectives PDF
Comptia-Security-Sy0-401 Exam Objectives PDF
Comptia-Security-Sy0-401 Exam Objectives PDF
Certification Exam
Objectives
EXAM NUMBER: SY0-401
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-401)
TEST DETAILS
Required exam
Number of questions
Maximum of 90
Types of questions
Length of test
90 minutes
PERCENTAGE OF EXAMINATION
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-401)
1.2
1.3
- Signature-based
- Anomaly-based
- Heuristic
Protocol analyzers
Spam filter
UTM security appliances
- URL filter
- Content inspection
- Malware inspection
Flood guards
Loop protection
Implicit deny
Network separation
Log analysis
Unified threat management
Cloud computing
- PaaS
- SaaS
- IaaS
- Private
- Public
- Hybrid
- Community
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-401)
1.5
- IPv4
- IPv6
- iSCSI
- Fibre Channel
- FCoE
- FTP
- SFTP
- TFTP
- TELNET
- HTTP
- NetBIOS
Ports
- 21
- 22
- 25
- 53
- 80
- 110
- 139
- 143
- 443
- 3389
OSI relevance
MAC filter
Disable SSID broadcast
TKIP
CCMP
Antenna placement
Power level controls
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-401)
Captive portals
Antenna types
Site surveys
VPN (over open wireless)
2.2
2.3
Risk calculation
- Likelihood
- ALE
- Impact
- SLE
- ARO
- MTTR
- MTTF
- MTBF
Quantitative vs. qualitative
Vulnerabilities
Threat vectors
Probability/threat likelihood
Privacy considerations
Risk awareness
Unauthorized data sharing
Data ownership
Data backups
Follow security policy and procedures
Review agreement requirements to verify
compliance and performance standards
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-401)
2.5
Recovery/reconstitution procedures
First responder
Incident isolation
- Quarantine
- Device removal
Data breach
2.7
2.6
- Fencing
- Proximity readers
- Access list
- Proper lighting
- Signs
- Guards
- Barricades
- Biometrics
- Protected distribution (cabling)
- Alarms
- Motion detection
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-401)
Control types
- Deterrent
- Preventive
- Detective
- Compensating
- Technical
- Administrative
2.9
Fault tolerance
- Hardware
- RAID
- Clustering
- Load balancing
- Servers
Disaster recovery concepts
- Backup plans/policies
- Backup execution/frequency
- Cold site
- Hot site
- Warm site
Availability
- Redundancy
- Fault tolerance
- Patching
Safety
- Fencing
- Lighting
- Locks
- CCTV
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-401)
- Escape plans
- Drills
- Escape routes
- Testing controls
3.2
3.3
Vishing
Spear phishing
Xmas attack
Pharming
Privilege escalation
Malicious insider threat
DNS poisoning and ARP poisoning
Transitive access
Client-side attacks
Password attacks
- Brute force
- Dictionary attacks
- Hybrid
- Birthday attacks
- Rainbow tables
Typo squatting/URL hijacking
Watering hole attack
3.4
Logic bomb
Botnets
Ransomware
Polymorphic malware
Armored virus
Whaling
Vishing
Principles (reasons for effectiveness)
- Authority
- Intimidation
- Consensus/social proof
- Scarcity
- Urgency
- Familiarity/liking
- Trust
Bluesnarfing
War chalking
IV attack
Packet sniffing
Near field communication
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-401)
Replay attacks
WEP/WPA attacks
WPS attacks
3.6
Network security
- MAC limiting and filtering
- 802.1x
- Disabling unused interfaces
and unused application service ports
- Rogue machine detection
Security posture
- Initial baseline configuration
- Continuous security monitoring
- Remediation
Reporting
- Alarms
- Alerts
- Trends
Detection controls vs. prevention controls
- IDS vs. IPS
- Camera vs. guard
3.8
Session hijacking
Header manipulation
Arbitrary code execution/remote
code execution
3.7
Integer overflow
Zero-day
Cookies and attachments
Locally Shared Objects (LSOs)
Flash cookies
Malicious add-ons
Assessment technique
- Baseline reporting
- Code review
- Determine attack surface
- Review architecture
- Review designs
Vulnerability scanning
- Passively testing security controls
- Identify vulnerability
- Identify lack of security controls
- Identify common misconfigurations
- Intrusive vs. non-intrusive
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-401)
4.2
4.3
Application configuration
baseline (proper settings)
Application hardening
Application patch management
NoSQL databases vs. SQL databases
Server-side vs. client-side validation
Application security
- Key management
- Credential management
- Authentication
- Geo-tagging
- Encryption
- Application whitelisting
- Transitive trust/authentication
BYOD concerns
- Data ownership
- Support ownership
- Patch management
- Antivirus management
- Forensics
- Privacy
- On-boarding/off-boarding
- Adherence to corporate policies
- User acceptance
- Architecture/infrastructure
considerations
- Legal concerns
- Acceptable use policy
- On-board camera/video
Trusted OS
Host-based firewalls
Host-based intrusion detection
Hardware security
- Cable locks
- Safe
- Locking cabinets
Host software baselining
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-401)
Virtualization
- Snapshots
- Patch compatibility
- Host availability/elasticity
- Security control testing
- Sandboxing
4.5
Methods
- Network segmentation
- Security layers
- Application firewalls
- Manual updates
- Firmware version control
- Wrappers
- Control redundancy and diversity
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-401)
Data policies
- Wiping
- Disposing
- Retention
- Storage
5.2
5.3
XTACACS
SAML
Secure LDAP
Authentication
- Tokens
- Common access card
- Smart card
- Multifactor authentication
- TOTP
- HOTP
- CHAP
- PAP
- Single sign-on
- Access control
- Implicit deny
- Trusted OS
Authentication factors
- Something you are
- Something you have
- Something you know
- Somewhere you are
- Something you do
Identification
- Biometrics
- Personal identification verification card
- Username
Federation
Transitive trust/authentication
- Lockout
- Password history
- Password reuse
- Password length
- Generic account prohibition
Group-based privileges
User-assigned privileges
User access reviews
Continuous monitoring
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-401)
6.0 Cryptography
6.1
6.2
6.3
Transport encryption
Non-repudiation
Hashing
Key escrow
Steganography
Digital signatures
NTLM
NTLMv2
Blowfish
PGP/GPG
Twofish
DHE
ECDHE
CHAP
PAP
Comparative strengths and
performance of algorithms
PKI
Recovery agent
Public key
Private key
Registration
Key escrow
Trust models
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-401)
Use of algorithms/protocols
with transport encryption
- SSL
- TLS
- IPSec
- SSH
- HTTPS
Cipher suites
- Strong vs. weak ciphers
Key stretching
- PBKDF2
- Bcrypt
SPELLED OUT
3DES
Triple Digital Encryption Standard
AAA
Authentication, Authorization and Accounting
ACL
Access Control List
AES
Advanced Encryption Standard
AES256
Advanced Encryption Standards 256-bit
AH
Authentication Header
ALE
Annualized Loss Expectancy
AP
Access Point
API
Application Programming Interface
APT
Advanced Persistent Threat
ARO
Annualized Rate of Occurrence
ARP
Address Resolution Protocol
ASLR
Address Space Layout Randomization
ASP
Application Service Provider
AUP
Acceptable Use Policy
AV Antivirus
BAC
Business Availability Center
BCP
Business Continuity Planning
BIA
Business Impact Analysis
BIOS
Basic Input/Output System
BPA
Business Partners Agreement
BPDU
Bridge Protocol Data Unit
BYOD
Bring Your Own Device
CA
Certificate Authority
CAC
Common Access Card
CAN
Controller Area Network
CAPTCHA
Completely Automated Public Turing
test to tell Computers and Humans Apart
CAR
Corrective Action Report
CCMP
Counter-mode/CBC-MAC Protocol
CCTV
Closed-Circuit Television
CERT
Computer Emergency Response Team
CFB
Cipher Feedback
CHAP
Challenge Handshake Authentication Protocol
CIO
Chief Information Officer
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-401)
ACRONYM
SPELLED OUT
CIRT
CMS
COOP
CP
CRC
CRL
CRM
CSO
CSP
CSR
CSRF
CSU
CTO
DAC
DBA
DDoS
DEP
DES
DHCP
DHE
DHE
DLL
DLP
DMZ
DNAT
DNS
DoS
DRP
DSA
DSL
DSU
EAP
ECC
ECDHE
ECDSA
ACRONYM
SPELLED OUT
EFS
Encrypted File System
EMI
Electromagnetic Interference
ERP
Enterprise Resource Planning
ESN
Electronic Serial Number
ESP
Encapsulated Security Payload
FACL
File system Access Control List
FDE
Full Disk Encryption
FQDN
Fully Qualified Domain Name
FRR
False Rejection Rate
FTP
File Transfer Protocol
FTPS
Secured File Transfer Protocol
GCM
Galois Counter Mode
GPG
GNU Privacy Guard
GPO
Group Policy Object
GPS
Global Positioning System
GPU
Graphic Processing Unit
GRE
Generic Routing Encapsulation
HA
High Availability
HDD
Hard Disk Drive
HIDS
Host-based Intrusion Detection System
HIPS
Host-based Intrusion Prevention System
HMAC
Hashed Message Authentication Code
HOTP
HMAC-based One Time Password
HSM
Hardware Security Module
HSRP
Hot Standby Router Protocol
HTML
Hypertext Markup Language
HTTP
Hypertext Transfer Protocol
HTTPS
Hypertext Transfer Protocol over SSL
HVAC
Heating, Ventilation and Air Conditioning
IaaS
Infrastructure as a Service
ICMP
Internet Control Message Protocol
ICS
Industrial Control Systems
ID Identification
IDEA
International Data Encryption Algorithm
IDF
Intermediate Distribution Frame
IdP
Identity Provider
IDS
Intrusion Detection System
IKE
Internet Key Exchange
IM
Instant Messaging
IMAP4
Internet Message Access Protocol v4
IoT
Internet of Things
IP
Internet Protocol
IPSec
Internet Protocol Security
IR
Incident Response
IRC
Internet Relay Chat
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-401)
ACRONYM
SPELLED OUT
IRP
Incident Response Procedure
ISA
Interconnection Security Agreement
ISP
Internet Service Provider
ISSO
Information Systems Security Officer
ITCP
IT Contingency Plan
IV
Initialization Vector
JBOD
Just a Bunch Of Disks
KDC
Key Distribution Center
KEK
Key Encryption Key
L2TP
Layer 2 Tunneling Protocol
LAN
Local Area Network
LDAP
Lightweight Directory Access Protocol
LEAP
Lightweight Extensible Authentication Protocol
MaaS
Monitoring as a Service
MAC
Mandatory Access Control or Media Access Control
MAC
Message Authentication Code
MAN
Metropolitan Area Network
MBR
Master Boot Record
MD5
Message Digest 5
MDF
Main Distribution Frame
MITM Man-In-The-Middle
MOU
Memorandum Of Understanding
MPLS
Multi-Protocol Layer Switch
MSCHAP
Microsoft Challenge Handshake
Authentication Protocol
MTBF
Mean Time Between Failures
MTTR
Mean Time To Recover
MTTF
Mean Time To Failure
MTU
Maximum Transmission Unit
NAC
Network Access Control
NAT
Network Address Translation
NDA
Non-Disclosure Agreement
NFC
Near Field Communication
NIDS
Network-based Intrusion Detection System
NIPS
Network-based Intrusion Prevention System
NIST
National Institute of Standards and Technology
NOS
Network Operating System
NTFS
New Technology File System
NTLM
New Technology LANMAN
NTP
Network Time Protocol
OAUTH
Open Authorization
OCSP
Online Certificate Status Protocol
OLA
Open License Agreement
OS
Operating System
OVAL
Open Vulnerability Assessment Language
ACRONYM
SPELLED OUT
P2P
Peer to Peer
PAC
Proxy Auto Configuration
PAM
Pluggable Authentication Modules
PAP
Password Authentication Protocol
PAT
Port Address Translation
PBKDF2
Password-Based Key Derivation Function 2
PBX
Private Branch Exchange
PCAP
Packet Capture
PEAP
Protected Extensible Authentication Protocol
PED
Personal Electronic Device
PFS
Perfect Forward Secrecy
PGP
Pretty Good Privacy
PII
Personally Identifiable Information
PIV
Personal Identity Verification
PKI
Public Key Infrastructure
POTS
Plain Old Telephone Service
PPP
Point-to-Point Protocol
PPTP
Point-to-Point Tunneling Protocol
PSK
Pre-Shared Key
PTZ Pan-Tilt-Zoom
RA
Recovery Agent
RA
Registration Authority
RAD
Rapid Application Development
RADIUS
Remote Authentication Dial-In User Server
RAID
Redundant Array of Inexpensive Disks
RAS
Remote Access Server
RBAC
Role-Based Access Control
RBAC
Rule-Based Access Control
RC4
RSA Variable Key Size Encryption Algorithm
RDP
Remote Desktop Protocol
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
ROI
Return On Investment
RPO
Recovery Point Objective
RSA
Rivest, Shamir and Adleman
RTBH
Remote Triggered Black Hole
RTO
Recovery Time Objective
RTP
Real-time Transport Protocol
S/MIME
Secure/Multipurpose Internet Mail Extensions
SAML
Security Assertions Markup Language
SaaS
Software as a Service
SAN
Storage Area Network
SCADA
System Control and Data Acquisition
SCAP
Security Content Automation Protocol
SCEP
Simple Certificate Enrollment Protocol
SCSI
Small Computer System Interface
SDLC
Software Development Life Cycle
SDLM
Software Development Life Cycle Methodology
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-401)
ACRONYM
SPELLED OUT
SEH
SHA
SFTP
SHTTP
SIEM
SIM
SLA
SLE
SMS
SMTP
SMTPS
SNMP
SOAP
SONET
SPIM
SQL
SSD
SSH
SSL
SSO
STP
TACACS+
TCP/IP
TFTP
TGT
TKIP
TLS
TOTP
TPM
TSIG
UAT
UEFI
UDP
UPS
URI
URL
USB
UTM
UTP
VDI
VLAN
VLSM
VM
VoIP
VPN
ACRONYM
SPELLED OUT
VTC
WAF
WAP
WEP
WIDS
WIPS
WPA
WPA2
WPS
WTLS
XML
XSRF
XSS
Video Teleconferencing
Web-Application Firewall
Wireless Access Point
Wired Equivalent Privacy
Wireless Intrusion Detection System
Wireless Intrusion Prevention System
WiFi Protected Access
WiFi Protected Access 2
WiFi Protected Setup
Wireless TLS
Extensible Markup Language
Cross-Site Request Forgery
Cross-Site Scripting
CompTIA Security+ Certification Exam Objectives Version 1.0 (Exam Number: SY0-401)
SOFTWARE
Router
Firewall
Access point
Switch
IDS/IPS
Server
Content filter
Client
Mobile device
VPN concentrator
All-in-one appliance
Enterprise security managers/SIEM suite
Load balancer
BackTrack
Proxy server
Kali/BackTrack
Virtualization software
Virtualized appliances
Wireshark
TCPdump
NMAP
OpenVAS
Metasploit
Back Orifice
Cain & Abel
John the Ripper
pfSense
Security Onion
Roo
Any UTM
SPARE PARTS/HARDWARE
Keyboards, mice
Network cables
Monitors
OTHER
TOOLS
SourceForge
WiFi analyzers
2016 CompTIA Properties, LLC, used under license by CompTIA Certifications, LLC. All rights reserved. All certification programs and education related to such
programs are operated exclusively by CompTIA Certifications, LLC. CompTIA is a registered trademark of CompTIA Properties, LLC in the U.S. and internationally.
Other brands and company names mentioned herein may be trademarks or service marks of CompTIA Properties, LLC or of their respective owners. Reproduction or dissemination prohibited without written consent of CompTIA Properties, LLC. Printed in the U.S. 01754-Feb2016