Tag Archives: Section 4.3

Practice Exam A.2.6 – Domain 6: Security – TestOut

Objective: 

This section contains six domain practice reviews related to the CompTIA ITF Practice Exam Domains:

The domain practices:

  • Have 20 questions per domain review
  • Are randomly generated
  • Have no time limit
  • Are not pass/fail
  • Have a percentage score at the end of the session
  • Recommend an 80% passing score.

Links:

Topics Discussed:

  • Section 2.1: The Internet
  • Section 2.4: Networking Standards and Protocols
  • Section 2.5: Application Delivery
  • Section 4.2: Data
  • Section 4.3: Threats to Data
  • Section 4.4: Security Concepts
  • Section 4.5: Personal Data and Device Security
  • Section 4.6: Corporate Data Security

Assignment:

  1. Access the TestOut Courseware through the provided link.
  2. Review Sections 2.1, 2.4, 2.5, 4.2, 4.3, 4.4, 4.5 and 4.6, and take the 20 question A.2.6 practice test. Your goal is to achieve a score of 80% or higher on the practice test.
  3. After you finish, you may review each question by selecting the Individual Responses option, then return to the relevant section in the course to review the instructional material.
  4. Retake the practice test after reviewing the material to make progress towards and achieve the 80% passing score before the end of day on Friday of this week.
  5. We will take a comprehensive practice test covering all six of the CompTIA Exam Objective Domains on Tuesday of next week. Use these six practice tests as your review resources to identify gaps in your knowledge, and re-read the relevant chapters to fill these gaps and prepare for Tuesday’s comprehensive practice test.

Assigned: February 13th, 2020
Teacher Pacing Due Date: February 14th, 2020

Section 4.3 – Threats to Data – TestOut

Objective: 

This section introduces you to the most common threats to data confidentiality, integrity, and availability. After finishing this section, you should be able to :

  • Describe the most common threats to data confidentiality.
  • Describe the most common threats to data integrity.
  • Describe the most common threats to data availability.
  • Identify common social engineering techniques used by hackers to gain access to online data.
  • Evaluate email messages to determine if they represent a possible social engineering attack

Links:

Key Terms:

  • Snooping Attempting to secretively discover private information about a person, company, or other entity.
  • Wiretapping A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.
  • Social Engineering The use of deception to gain personal and/or private information for unlawful purposes.
  • Reconnaissance The passive gathering of information about a potential victim.
  • Pretexting Tricking a victim into revealing sensitive information under false pretenses.
  • Email Attack Exploiting a victim using email messages.
  • Browser Attack Convincing a victim that they are performing a legitimate task within their web browser window when, in fact, they are being tricked into revealing sensitive information or installing malware on their computer.
  • Man-in-the-Middle Attack An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.
  • Replay Attack An attempt to connect to a server by capturing and resending authentication information.
  • Impersonation TCP session hacking and other methods where an attacker takes over the communication to a server by appearing to be the victim.
  • Denial of Service An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.

Topics Discussed:

  • How can businesses and individuals protect confidential information?
  • What are some of the most common ways hackers gain unauthorized access to online data?
  • What are the biggest threats to business data availability?

Assignment:

  1. Access the TestOut Courseware through the provided link.
  2. Study Section 4.3: Threats to Data, and achieve a score of 80% or higher on the 15 question Exam to complete the Section.

Assigned: January 14th, 2020
Teacher Pacing Due Date: January 15th, 2020