Thư viện tri thức trực tuyến
Kho tài liệu với 50,000+ tài liệu học thuật
© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

CompTIA Security study guide
Nội dung xem thử
Mô tả chi tiết
Wiley Publishing, Inc.
CompTIA Security+™
Study Guide
Third Edition
Mike Pastore
Emmett Dulaney
3668fm.fm Page i Thursday, March 16, 2006 9:16 AM
Acquisitions and Development Editor: Jeff Kellum
Technical Editor: Warren Wytostek
Production Editor: Angela Smith
Copy Editor: Liz Welch
Production Manager: Tim Tate
Vice President and Executive Group Publisher: Richard Swadley
Vice President and Executive Publisher: Joseph B. Wikert
Vice President and Publisher: Neil Edde
Permissions Editor: Shannon Walters
Media Development Specialist: Kit Malone
Book Designer: Judy Fung
Compositor: Craig Woods, Happenstance Type-O-Rama
Proofreader: WordOne
Indexer: Ted Laux
Cover Designer: Archer Design
Cover Image: Photodisc and Victor Arre
Copyright © 2006 by Wiley Publishing, Inc., Indianapolis, Indiana
Published simultaneously in Canada
ISBN-13: 978-0-4700-3668-6
ISBN-10: 0-4700-3668-0
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any
means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections
107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or
authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood
Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should
be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256,
(317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties
with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties,
including without limitation warranties of fitness for a particular purpose. No warranty may be created or
extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for
every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal,
accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Website is referred to in this work as a citation and/or a potential source
of further information does not mean that the author or the publisher endorses the information the organization
or Website may provide or recommendations it may make. Further, readers should be aware that Internet Websites listed in this work may have changed or disappeared between when this work was written and when it is read.
For general information on our other products and services or to obtain technical support, please contact our Customer
Care Department within the U.S. at (800) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be
available in electronic books.
Library of Congress Cataloging-in-Publication Data is available from the publisher.
TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John
Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without
written permission. CompTIA Security+ is a trademark of the Computing Technology Industry Association. All
other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with any
product or vendor mentioned in this book.
10 9 8 7 6 5 4 3 2 1
3668fm.fm Page ii Thursday, March 16, 2006 9:16 AM
Sybex is an independent entity from CompTIA and is not affiliated with CompTIA in any manner. Neither
CompTIA nor Sybex warrants that use of this publication will ensure passing the relevant exam. Security+ is
either a registered trademark or trademark of CompTIA in the United States and/or other countries.
The logo of the CompTIA Authorized Quality Curriculum (CAQC) program and the status of this or other
training material as “Authorized” under the CompTIA Authorized Quality Curriculum program signifies that,
in CompTIA’s opinion, such training material covers the content of the CompTIA’s related certification exam.
CompTIA has not reviewed or approved the accuracy of the contents of this training material and specifically
disclaims any warranties of merchantability or fitness for a particular purpose. CompTIA makes no guarantee
concerning the success of persons using any such “Authorized” or other training material in order to prepare
for any CompTIA certification exam.
The contents of this training material were created for the CompTIA Security+ exam covering CompTIA
certification objectives that were current as of 2002.
How to Become CompTIA Certified:
This training material can help you prepare for and pass a related CompTIA certification exam or exams. In order
to achieve CompTIA certification, you must register for and pass a CompTIA certification exam or exams.
In order to become CompTIA certified, you must:
(1) Select a certification exam provider. For more information please visit http://www.comptia.org/certification/
general_information/exam_locations.aspx.
(2) Register for and schedule a time to take the CompTIA certification exam(s) at a convenient location.
(3) Read and sign the Candidate Agreement, which will be presented at the time of the exam(s). The text of the
Candidate Agreement can be found at http://www.comptia.org/certification/general_information/candidate_
agreement.aspx.
(4) Take and pass the CompTIA certification exam(s).
For more information about CompTIA’s certifications, such as their industry acceptance, benefits, or program
news, please visit http://www.comptia.org/certification.
CompTIA is a non-profit information technology (IT) trade association. CompTIA’s certifications are designed by
subject matter experts from across the IT industry. Each CompTIA certification is vendor-neutral, covers multiple
technologies, and requires demonstration of skills and knowledge widely sought after by the IT industry.
To contact CompTIA with any questions or comments:
Please call + 1 630-678-8300
Sybex is an independent entity from CompTIA and is not affiliated with CompTIA in any manner. Neither
CompTIA nor Sybex warrants that use of this publication will ensure passing the relevant exam. Security+ is
either a registered trademark or trademark of CompTIA in the United States and/or other countries.
3668fm.fm Page iii Thursday, March 16, 2006 9:16 AM
To Our Valued Readers:
Thank you for looking to Sybex for your Security+ exam prep needs. We at Sybex are proud
of our reputation for providing certification candidates with the practical knowledge and
skills needed to succeed in the highly competitive IT marketplace. Certification candidates
have come to rely on Sybex for accurate and accessible instruction on today’s crucial technologies and business skills.
Just as CompTIA is committed to establishing measurable standards for certifying IT security
professionals by means of the Security+ certification, Sybex is committed to providing those
individuals with the knowledge needed to meet those standards.
The authors and editors have worked hard to ensure that the new edition of the CompTIA
Security+ Study Guide you hold in your hands is comprehensive, in-depth, and pedagogically sound. We’re confident that this book will exceed the demanding standards of the certification marketplace and help you, the Security+ certification candidate, succeed in your
endeavors.
As always, your feedback is important to us. If you believe you’ve identified an error in the
book, please send a detailed e-mail to [email protected]. And if you have general comments or suggestions, feel free to drop me a line directly at [email protected]. At Sybex we're
continually striving to meet the needs of individuals preparing for certification exams.
Good luck in pursuit of your Security+ certification!
Neil Edde
Vice President & Publisher
Wiley Publishing, Inc.
3668fm.fm Page iv Thursday, March 16, 2006 9:16 AM
Contents at a Glance
Introduction xv
Assessment Test xxix
Chapter 1 General Security Concepts 1
Chapter 2 Identifying Potential Risks 51
Chapter 3 Infrastructure and Connectivity 103
Chapter 4 Monitoring Activity and Intrusion Detection 165
Chapter 5 Implementing and Maintaining a Secure Network 211
Chapter 6 Securing the Network and Environment 253
Chapter 7 Cryptography Basics, Methods, and Standards 301
Chapter 8 Security Policies and Procedures 369
Chapter 9 Security Management 419
Glossary 455
Index 495
3668fm.fm Page v Thursday, March 16, 2006 9:16 AM
3668fm.fm Page vi Thursday, March 16, 2006 9:16 AM
Contents
Introduction xv
Assessment Test xxix
Chapter 1 General Security Concepts 1
Understanding Information Security 4
Securing the Physical Environment 5
Examining Operational Security 7
Working with Management and Policies 9
Understanding the Goals of Information Security 13
Comprehending the Security Process 14
Appreciating Antivirus Software 14
Implementing Access Control 14
Understanding Authentication 16
Understanding Networking Services and Protocols 22
Distinguishing Between Security Topologies 24
Setting Design Goals 25
Creating Security Zones 27
Working with Newer Technologies 31
Business Concerns to Be Aware Of 34
Summary 39
Exam Essentials 40
Hands-On Labs 43
Lab 1.1: Update a Linux System 43
Lab 1.2: Update a Windows-Based System 43
Review Questions 44
Answers to Review Questions 48
Chapter 2 Identifying Potential Risks 51
Calculating Attack Strategies 52
Types of Access Attacks 53
Recognizing Modification and Repudiation Attacks 55
Identifying Denial-of-Service (DoS) and Distributed DoS
(DDoS) Attacks 55
Recognizing Common Attacks 57
Back Door Attacks 57
Spoofing Attacks 58
Man-in-the-Middle Attacks 59
Replay Attacks 60
Password-Guessing Attacks 61
3668fm.fm Page vii Thursday, March 16, 2006 9:16 AM
viii Contents
Identifying TCP/IP Security Concerns 61
Working with the TCP/IP Protocol Suite 63
Encapsulation 66
Working with Protocols and Services 67
Recognizing TCP/IP Attacks 70
Understanding Software Exploitation 76
Surviving Malicious Code 78
Viruses 78
Trojan Horses 85
Logic Bombs 85
Worms 86
Antivirus Software 87
Understanding Social Engineering 88
An Introduction to Auditing Processes and Files 90
Summary 91
Exam Essentials 92
Hands-On Labs 95
Lab 2.1: Identify Running Processes
on a Windows-Based Machine 95
Lab 2.2: Identify Running Processes
on a Linux-Based Machine 95
Review Questions 97
Answers to Review Questions 101
Chapter 3 Infrastructure and Connectivity 103
Understanding Infrastructure Security 105
Working with Hardware Components 106
Working with Software Components 108
Understanding the Different Network Infrastructure Devices 109
Firewalls 109
Hubs 114
Routers 114
Switches 116
Wireless Access Points 117
Modems 119
Remote Access Services 119
Telecom/PBX Systems 120
Virtual Private Networks 122
Monitoring and Diagnosing Networks 123
Network Monitors 123
Securing Workstations and Servers 125
Understanding Mobile Devices 127
3668fm.fm Page viii Thursday, March 16, 2006 9:16 AM
Contents ix
Understanding Remote Access 128
Using the Point-to-Point Protocol 128
Tunneling Protocols 129
802.1x Wireless Protocols 130
RADIUS 130
TACACS/+ 131
Securing Internet Connections 132
Working with Ports and Sockets 132
Working with E-mail 133
Working with the Web 134
Working with the File Transfer Protocol 139
Understanding SNMP and
Other TCP/IP Protocols 141
The Basics of Cabling, Wires, and Communications 142
Coax 142
Unshielded Twisted Pair and Shielded Twisted Pair 146
Fiber Optic 147
Infrared 148
Radio Frequencies 148
Microwave Systems 149
Employing Removable Media 151
Tape 151
CD-R 152
Hard Drives 153
Diskettes 153
Flash Cards 153
Smart Cards 154
Summary 154
Exam Essentials 156
Hands-On Labs 157
Lab 3.1: Examine the Windows Routing Table 157
Lab 3.2: Examine the Linux Routing Table 157
Review Questions 158
Answers to Review Questions 162
Chapter 4 Monitoring Activity and Intrusion Detection 165
Monitoring the Network 167
Recognizing the Different Types of Network Traffic 168
Monitoring Network Systems 173
Understanding Intrusion Detection Systems 174
Working with a Network-Based IDS 178
3668fm.fm Page ix Thursday, March 16, 2006 9:16 AM
x Contents
Working with a Host-Based IDS 183
Utilizing Honey Pots 184
Understanding Incident Response 186
Working with Wireless Systems 191
Wireless Transport Layer Security 191
IEEE 802.11x Wireless Protocols 192
WEP/WAP 192
Wireless Vulnerabilities to Know 193
Understanding Instant Messaging’s Features 194
IM Vulnerabilities 195
Controlling Privacy 195
Working with 8.3 File Naming 195
Understanding Packet Sniffing 196
Understanding Signal Analysis and Intelligence 197
Footprinting 197
Scanning 198
Summary 198
Exam Essentials 199
Hands-On Labs 201
Lab 4.1: View the Active TCP and UDP Ports 201
Lab 4.2: Run Windows Network Monitor 201
Lab 4.3: Install snort in Linux 202
Lab 4.4: Make File Extensions Visible in Windows XP 202
Lab 4.5: Monitor Network Traffic in Linux 202
Review Questions 204
Answers to Review Questions 208
Chapter 5 Implementing and Maintaining a Secure Network 211
Overview of Network Security Threats 213
Defining Security Baselines 215
Hardening the OS and NOS 217
Configuring Network Protocols 218
Hardening Microsoft Windows 2000 220
Hardening Microsoft Windows XP 222
Hardening Windows Server 2003 222
Hardening Unix/Linux 223
Hardening Novell NetWare 224
Hardening Apple Macintosh 225
Hardening Filesystems 225
Updating Your Operating System 228
Hardening Network Devices 229
Updating Network Devices 230
Configuring Routers and Firewalls 230
3668fm.fm Page x Thursday, March 16, 2006 9:16 AM
Contents xi
Hardening Applications 231
Hardening Web Servers 232
Hardening E-Mail Servers 233
Hardening FTP Servers 234
Hardening DNS Servers 234
Hardening NNTP Servers 235
Hardening File and Print Servers and Services 236
Hardening DHCP Services 237
Working with Data Repositories 238
Summary 241
Exam Essentials 243
Hands-On Labs 244
Lab 5.1: Install OpenLDAP on a SuSE Server 244
Lab 5.2: Work with Performance Monitor and Windows 244
Lab 5.3: Work with Unix/Linux Networking 245
Lab 5.4: Install and Configure the E-mail Service on a
SuSE Server 245
Review Questions 246
Answers to Review Questions 250
Chapter 6 Securing the Network and Environment 253
Understanding Physical and Network Security 254
Implementing Access Control 254
Understanding Social Engineering 261
Scanning the Environment 264
Understanding Business Continuity Planning 271
Undertaking Business Impact Analysis 272
Assessing Risk 273
Developing Policies, Standards, and Guidelines 275
Implementing Policies 276
Incorporating Standards 277
Following Guidelines 278
Working with Security Standards and ISO 17799 279
Classifying Information 280
Public Information 281
Private Information 282
Roles in the Security Process 284
Information Access Controls 285
Summary 289
Exam Essentials 291
Hands-On Lab 293
Lab 6.1: Test Social Engineering 293
Review Questions 294
Answers to Review Questions 298
3668fm.fm Page xi Thursday, March 16, 2006 9:16 AM
xii Contents
Chapter 7 Cryptography Basics, Methods, and Standards 301
An Overview of Cryptography 303
Understanding Physical Cryptography 304
Understanding Mathematical Cryptography 306
Understanding Quantum Cryptography 308
Uncovering the Myth of Unbreakable Codes 309
Understanding Cryptographic Algorithms 310
The Science of Hashing 310
Working with Symmetric Algorithms 312
Working with Asymmetric Algorithms 313
Using Cryptographic Systems 315
Confidentiality 315
Integrity 315
Authentication 318
Nonrepudiation 319
Access Control 319
Using Public Key Infrastructure 320
Using a Certificate Authority 321
Working with Registration Authorities and Local
Registration Authorities 322
Implementing Certificates 324
Understanding Certificate Revocation 325
Implementing Trust Models 326
Preparing for Cryptographic Attacks 330
Understanding Cryptography Standards and Protocols 332
The Origins of Encryption Standards 332
PKIX/PKCS 336
X.509 337
SSL and TLS 338
CMP 339
S/MIME 340
SET 340
SSH 340
PGP 343
HTTPS 343
S-HTTP 344
IPSec 344
FIPS 344
Common Criteria 345
WTLS 345
WEP 345
ISO 17799 345
3668fm.fm Page xii Thursday, March 16, 2006 9:16 AM
Contents xiii
Understanding Key Management and the Key Life Cycle 346
Comparing Centralized and Decentralized Key Generation 346
Storing and Distributing Keys 348
Using Key Escrow 350
Key Expiration 351
Revoking Keys 351
Suspending Keys 352
Recovering and Archiving Keys 352
Renewing Keys 354
Destroying Keys 355
Key Usage 355
Summary 356
Exam Essentials 358
Hands-On Labs 361
Lab 7.1: Hash Rules in Windows Server 2003 361
Lab 7.2: SSL Settings in Windows Server 2003 361
Lab 7.3: Encrypting a File System in Linux 362
Lab 7.4: Look for Errors in IPSec Performance Statistics 362
Review Questions 363
Answers to Review Questions 367
Chapter 8 Security Policies and Procedures 369
Understanding Business Continuity 371
Utilities 371
High Availability 372
Disaster Recovery 378
Reinforcing Vendor Support 390
Service-Level Agreements (SLAs) 390
Code Escrow 392
Generating Policies and Procedures 393
Human Resource Policies 393
Business Policies 397
Certificate Policies 398
Incident-Response Policies 400
Enforcing Privilege Management 401
User and Group Role Management 401
Privilege Escalation 403
Single Sign-On 403
Privilege Decision Making 404
Auditing 405
Access Control 407
Summary 408
Exam Essentials 409
3668fm.fm Page xiii Thursday, March 16, 2006 9:16 AM
xiv Contents
Hands-On Labs 411
Lab 8.1: Use Automated System Recovery in Windows
Server 2003 411
Lab 8.2: Create a Rescue Disk in Linux 411
Lab 8.3: Create a Backup with SuSE Linux 411
Review Questions 413
Answers to Review Questions 417
Chapter 9 Security Management 419
Understanding Computer Forensics 420
Methodology of a Forensic Investigation 421
Enforcing the Chain of Custody 423
Preserving Evidence 424
Collecting Evidence 425
Understanding Security Management 426
Drafting Best Practices and Documentation 426
Understanding Security Awareness and Education 433
Using Communication and Awareness 433
Providing Education 433
Staying on Top of Security 436
Websites 437
Trade Publications 438
Regulating Privacy and Security 440
Health Insurance Portability and Accountability Act 440
Gramm-Leach-Bliley Act of 1999 440
Computer Fraud and Abuse Act 441
Family Educational Rights and Privacy Act 441
Computer Security Act of 1987 442
Cyberspace Electronic Security Act 442
Cyber Security Enhancement Act 442
Patriot Act 442
Familiarizing Yourself with International Efforts 443
Summary 444
Exam Essentials 445
Hands-On Labs 447
Lab 9.1: Configure Windows Automatic Updates 447
Lab 9.2: Configure Linux Automatic Updates 447
Review Questions 448
Answers to Review Questions 452
Glossary 455
Index 495
3668fm.fm Page xiv Thursday, March 16, 2006 9:16 AM
Introduction
If you’re preparing to take the Security+ exam, you’ll undoubtedly want to find as much information as you can concerning computer and physical security. The more information you have
at your disposal and the more hands-on experience you gain, the better off you’ll be when
attempting the exam. This study guide was written with that in mind. We have attempted to
dispense as much information as we can about computer security. The key was to provide
enough information that you’ll be prepared for the test but not so much that you’ll be overloaded with information outside the scope of the exam.
This book presents the material at an intermediate technical level. Experience with and
understanding of security concepts, operating systems, and applications systems will help you
get a full understanding of the challenges facing you as a security professional.
We’ve included review questions at the end of each chapter to give you a taste of what it’s
like to take the exam. If you’re already working in the security field, we recommend that you
check out these questions first to gauge your level of expertise. You can then use the book
mainly to fill in the gaps in your current knowledge. This study guide will help you round out
your knowledge base before tackling the exam.
If you can answer 80 percent or more of the review questions correctly for a given chapter,
you can probably feel safe moving on to the next chapter. If you’re unable to answer that many
correctly, reread the chapter and try the questions again. Your score should improve.
Don’t just study the questions and answers! The questions on the actual
exam will be different from the practice questions included in this book and
on the CD. The exam is designed to test your knowledge of a concept or objective, so use this book to learn the objective behind the question.
Before You Begin
Before you begin studying for the exam, it’s imperative that you understand a few things
about the Security+ certification. Security+ is a certification-for-life from CompTIA granted
to those who obtain a passing score on a single entry-level exam. In addition to being a
stand-alone certification that can be added to your resume, Security+ can also be used as an
elective in Microsoft’s MCSA and MCSE tracks, and it counts as credit toward the security
specializations Microsoft offers.
When you’re studying for any exam, the first step in preparation should always be to find
out as much as possible about the test; the more you know up front, the better you can plan
your study. The current exam number, and the one this book is written to, is SY0-101; it consists of 100 questions. You have 90 minutes to take the exam, and the passing score is 764 on
a scale from 100 to 900. Both Pearson VUE and Thompson Prometric testing centers administer the exam throughout the United States and several other countries.
3668book.fm Page xv Wednesday, March 15, 2006 10:57 PM