Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
CompTIA Server+ Certification Guide

You're reading from   CompTIA Server+ Certification Guide A comprehensive, end-to-end study guide for the SK0-004 certification, along with mock exams

Arrow left icon
Product type Paperback
Published in Feb 2019
Publisher
ISBN-13 9781789534818
Length 514 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Ron Price Ron Price
Author Profile Icon Ron Price
Ron Price
Arrow right icon
View More author details
Toc

Table of Contents (28) Chapters Close

Preface 1. Section 1: System Architecture FREE CHAPTER
2. Server Hardware 3. Server Internals 4. Data Storage 5. Server Operating Systems 6. Addressing 7. Cabling 8. Section 2: Administration
9. Server Administration 10. Server Maintenance 11. Virtualization 12. Disaster Recovery 13. Section 3: Security
14. Security Systems and Protocols 15. Physical Security and Environmental Controls 16. Logical Security 17. Section 4: Troubleshooting
18. Troubleshooting Methods 19. Common Hardware Issues 20. Common Software Issues 21. Common Network Issues 22. Common Storage Issues 23. Common Security Issues 24. CompTIA Server+ Examination 25. Glossary 26. Assessment 27. Other Books You May Enjoy

Summary

A security zone is a logical structure that's created from one or more interfaces that apply the same security policies. Many firewalls predefine security zones, with the most common being LAN, VPN, DMZ, and WAN. A security zone applies security policies and access control policies.

Security devices, such as firewalls and intrusion detection and prevention devices, are either hardware or software. Security devices can be host-based or network-based. A host-based intrusion detection system is a HIDS and a network-based system is a NIDS.

An authentication protocol verifies the credentials that have been provided by a user are valid and serves as the first line of security defense for an open network. Authentication protocols are either PPP or AAA. The most common of the AAA protocols include Kerberos and IPSec. An IPSec policy defines rules and filters for specific...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image