Product Directory
Product Installation
Product Activation

Products > A+ Practical Application > Cram Notes

 A+ Practical Application (220-802) Cram Notes


       Previous        Next                       

2.4 Given a scenario, use the appropriate data destruction/disposal method

1. Batteries contain environmentally hazardous chemicals and therefore, should not be disposed through dust bit. Always refer to the manufacturer's instructions or the relevant State guidelines. The same is true when you are disposing chemical solvents.

2. MSDS stands for Material Safety Data Sheet. It is US state department document that contain information on any substance that is hazardous, and proper use / disposal.

3. Nickel Cadmium battery is not environmentally friendly and not as efficient as Nickel/Metal hydride or Lithium Ion. Nickel/Metal hydride, though environmentally friendly, not as efficient as Lithium Ion. Lithium Ion battery is environmentally friendly and very efficient.

4. To get rid of the old computers proper options are:

a. Donate to a charity

b. Recycle it by giving it to a recycle center

c. Give it to a training school in the neighborhood

2.5 Given a scenario, secure a SOHO wireless network

1. MAC limiting the MAC addresses that can access the wireless network, you can prevent unauthorized computers from accessing your wireless network. Note that each MAC address is unique, and hence MAC address filtering can effectively prevent unauthorized computer access.

2. MAC Filtering (or layer 2 address filtering) refers to a security access control method whereby the 48-bit address (also called MAC address) assigned to each network card is used to determine access to the network. MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists.

3. WEP, short for Wireless Equivalent Protection, is a security protocol designed to provide protection equivalent to wired LANs. WPA is an improved security protocol compared to WEP.

4. Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks.

5. Enabling SSID broadcast will only annount the network to neighborhood devices, thus lessening the security of the network.

2.6 Given a scenario, secure a SOHO wired network

1. If a networked computer is infected with zero day viruses then Traditionally, antivirus software relies upon signatures to identify malware. This can be very effective, but cannot defend against malware unless samples have already been obtained, signatures generated and updates distributed to users. Because of this, signature-based approaches are not effective against zero-day viruses.

2. A zero-day (or zero-hour or day zero) attack or threat is an attack that exploits a previously unknown vulnerability in a computer application, meaning that the attack occurs on "day zero" of awareness of the vulnerability. This means that the developers have had zero days to address and patch the vulnerability.

   Previous        Next            

Contact Us