Tag Archives: Section 4.6

Practice Exam A.2.6 – Domain 6: Security – TestOut

Objective: 

This section contains six domain practice reviews related to the CompTIA ITF Practice Exam Domains:

The domain practices:

  • Have 20 questions per domain review
  • Are randomly generated
  • Have no time limit
  • Are not pass/fail
  • Have a percentage score at the end of the session
  • Recommend an 80% passing score.

Links:

Topics Discussed:

  • Section 2.1: The Internet
  • Section 2.4: Networking Standards and Protocols
  • Section 2.5: Application Delivery
  • Section 4.2: Data
  • Section 4.3: Threats to Data
  • Section 4.4: Security Concepts
  • Section 4.5: Personal Data and Device Security
  • Section 4.6: Corporate Data Security

Assignment:

  1. Access the TestOut Courseware through the provided link.
  2. Review Sections 2.1, 2.4, 2.5, 4.2, 4.3, 4.4, 4.5 and 4.6, and take the 20 question A.2.6 practice test. Your goal is to achieve a score of 80% or higher on the practice test.
  3. After you finish, you may review each question by selecting the Individual Responses option, then return to the relevant section in the course to review the instructional material.
  4. Retake the practice test after reviewing the material to make progress towards and achieve the 80% passing score before the end of day on Friday of this week.
  5. We will take a comprehensive practice test covering all six of the CompTIA Exam Objective Domains on Tuesday of next week. Use these six practice tests as your review resources to identify gaps in your knowledge, and re-read the relevant chapters to fill these gaps and prepare for Tuesday’s comprehensive practice test.

Assigned: February 13th, 2020
Teacher Pacing Due Date: February 14th, 2020

Practice Exam A.2.2 – Domain 2: Infrastructure – TestOut

Objective: 

This section contains six domain practice reviews related to the CompTIA ITF Practice Exam Domains:

The domain practices:

  • Have 20 questions per domain review
  • Are randomly generated
  • Have no time limit
  • Are not pass/fail
  • Have a percentage score at the end of the session
  • Recommend an 80% passing score.

Links:

Topics Discussed:

  • Section 1.1: The Information Age
  • Section 1.3: Peripheral Devices
  • Section 1.4: Processing and Storage Hardware
  • Section 1.5: Operating Systems
  • Section 2.1: The Internet
  • Section 2.3: Networking Basics
  • Section 2.4: Networking Standards and Protocols
  • Section 4.6: Corporate Data Security

Assignment:

  1. Access the TestOut Courseware through the provided link.
  2. Review Sections 1.1, 1.3, 1.4. 1.5, 2.1, 2.3, 2.4 and 4.6, and take the 20 question A.2.2 practice test. Your goal is to achieve a score of 80% or higher on the practice test.
  3. After you finish, you may review each question by selecting the Individual Responses option, then return to the relevant section in the course to review the instructional material.
  4. Retake the practice test after reviewing the material to make progress towards and achieve the 80% passing score before advancing to the next Practice Exam.

Assigned: January 30th, 2020
Teacher Pacing Due Date: January 31st, 2020

Section 4.6 – Corporate Data Security – TestOut

Objective: 

This section introduces you to personal data and device security concepts and gives you practice configuring firewalls and anti-malware software on Windows. After finishing this section, you should be able to:

  • Compare and contrast classification schemes for handling confidential information.
  • Define data, network, and power redundancy and explain how they contribute to fault tolerance.
  • Explain why it’s important to back up data files.
  • Describe backup procedures for different types of data.
  • Explain the purpose of business continuity plans.
  • Describe the common components of a disaster recovery plan.
  • Describe common careers in IT security.
  • Configure Windows backup settings

Links:

Key Terms:

  • Information Sensitivity An attribute used to classify information based on the risk of public disclosure.
  • Public/Private Classification A scheme for classifying information based on different levels of public/private distinctions.
  • Government/Military Classification A scheme for classifying information based on government and military requirements.
  • Data Destruction Policy Directions for disposing and even destroying data when it’s no longer needed or when a storage device needs to be replaced.
  • Data Redundancy A method of increasing fault tolerance by storing data in a way that ensures that the data is recoverable in case of hardware failures. RAID arrays and replication are two data redundancy strategies.
  • Network Redundancy A method of increasing fault tolerance by providing multiple network paths between hosts.
  • Power Redundancy A method of increasing fault tolerance by providing power backups and power failover.
  • Network Attached Storage A device that contains one or more hard drives that users can access over the network.
  • Ad Hoc Backup Unscheduled backups performed periodically.
  • Regular Backup Regularly scheduled backups.
  • System Backup A backup of the system software, including operating system files.
  • Database Backup A backup of data stored in a database.
  • Local Backup Backups that are stored in the same building or even the same room as the computer systems they are taken from.
  • Off-site Backup Backups that are stored at a location far enough from a possible natural disaster while being close enough to recover the data and systems within a reasonable amount of time.
  • Disaster Recovery An area of security planning with the goal of protecting an organization from the effects of a natural or human-induced disaster.
  • Business Continuity The process of creating systems of prevention and recovery to permit ongoing operation, before and during disaster recovery.
  • Systems Administrator Concerning security, a person responsible for securing networks and responding to intrusions.
  • Computer Forensics Expert A person who works closely with law enforcement officials to investigate security breaches, cyber-attacks, and other crimes.
  • Security Analyst A person who is in charge of designing and implementing security methods to protect an organization’s computer systems and networks.

Topics Discussed:

    null
  • How do businesses classify information to keep it secure and private?
  • What are the most important components in creating fault tolerant information systems?
  • How does a good business continuity plan inform disaster recovery efforts

Assignment:

  1. Access the TestOut Courseware through the provided link.
  2. Study Section 4.6: Corporate Data Security, and achieve a score of 80% or higher on the 14 question Exam to complete the Section.

Assigned: January 27th, 2020
Teacher Pacing Due Date: January 28th, 2020