All those letters and numbers
Which of these can be used to launch the Windows Task Manager? Pick two.
Which of these can be used to launch the Windows Task Manager? Pick two.
You’ve just installed a new audio card into your Windows computer, but it doesn’t seem to provide any output. Which Windows utility can give you information on the status of your new audio card?
Where in Windows can you find a list of dependencies that might exist between services?
There are many ways to manage rights and permissions on the network. In this video, you’ll learn how to use user management, group management, and role-based management types to control privileges to resources.
What policies should you consider to make your passwords as secure as possible? In this video, you’ll learn about password complexity, length, expiration, lockout, and disablement.
CompTIA Security+ SY0-301: 5.3 – Account Policy Enforcement Read More »
We are constantly faced with security concerns associated with the massive number of accounts that we have to manage professionally and personally. In this video, you’ll learn about managing identities across multiple sites and how you can mitigate the issues that arise from an individual owning so many different accounts.
CompTIA Security+ SY0-301: 5.3 – Mitigating Multiple Account Issues Read More »
Many organizations evaluate the security of products based on a series of Common Criteria standards. In this video, you’ll learn about Common Criteria for Information Technology Security Evaluation, Evaluation Assurance Levels (EAL), and the time and cost associated with creating a trusted OS.
Once your users login to the network, how do you assign rights and permissions? In this video, you’ll learn about access control and how implicit deny and time-of-day restrictions can be used to add additional access control security.
CompTIA Security+ SY0-301: 5.2 – Authorization and Access Control Read More »
As our applications become more distributed inside of our organization and into the cloud, single sign-on becomes more of a challenge. In this video, you’ll learn the fundamentals of single sign-on, how many organization use single sign-on systems as their primary authentication system, and some of the challenges with moving single sign-on into the cloud.
Many of the disadvantages of single-factor authentication are solved with additional factors, but these also bring their own challenges. In this video, you’ll learn about multi-factor authentication and some common methods for implementing multiple authentication factors.
CompTIA Security+ SY0-301: 5.2 – Multi-Factor Authentication Read More »