Senior Acquisitions Editor: Jeff Kellum
Development Editor: Denise Lincoln
Technical Editors: Michael Gregg, Billy Haines
Production Editor: Liz Britten
Copy Editor: Linda Recktenwald
Editorial Manager: Pete Gaughan
Production Manager: Tim Tate
Vice President and Executive Group Publisher: Richard Swadley
Vice President and Publisher: Neil Edde
Media Project Manager 1: Laura Moss-Hollister
Media Associate Producer: Josh Frank
Media Quality Assurance: Marilyn Hummel
Book Designer: Judy Fung, Bill Gibson
Compositor: Craig Woods, Happenstance Type-O-Rama
Proofreader: Word One, New York
Indexer: Nancy Guenther
Project Coordinator, Cover: Katie Crocker
Cover Designer: Ryan Sneed
Copyright 2011 by Wiley Publishing, Inc., Indianapolis, Indiana
Published simultaneously in Canada
ISBN: 978-1-118-01473-8
ISBN: 978-1-118-11370-7 (ebk)
ISBN: 978-1-118-11371-4 (ebk)
ISBN: 978-1-118-11369-1 (ebk)
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions .
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read.
For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (877) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats and by print-on-demand. Not all content that is available in standard print versions of this book may appear or be packaged in all book formats. If you have purchased a version of this book that did not include media that is referenced by or accompanies a standard print version, you may request this media by visiting http://booksupport.wiley.com . For more information about Wiley products, visit us at www.wiley.com .
Library of Congress Cataloging-in-Publication Data is available from the publisher .
TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. CompTIA and Security+ are trademarks or registered trademarks of Computing Technology Industry Association, Inc, All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book.
10 9 8 7 6 5 4 3 2 1
Dear Reader,
Thank you for choosing CompTIA Security+ Study Guide, Fifth Edition from Sybex, a proud Authorized Gold Partner in the CompTIA Authorized Partner Program (CAPP) for content developers. The learning material in this book, which meets the exacting standards of CompTIAs content assurance program, was written by an outstanding author who combines practical experience with a passion for teaching.
Sybex was founded in 1976. More than 30 years later, were still committed to producing consistently exceptional books. With each of our titles, were working hard to set a new standard for the industry. From the paper we print on, to the authors we work with, our goal is to bring you the best books available.
I hope you see all that reflected in these pages. Id be very interested to hear your comments and get your feedback on how were doing. Feel free to let me know what you think about this or any other Sybex book by sending me an email at . Customer feedback is critical to our efforts at Sybex.
Best regards,
Neil Edde
Vice President and Publisher
Sybex, an Imprint of Wiley
For Karen, Kristin, Evan, and Spencer
Acknowledgments
This book would not exist were it not for Mike Pastore, the author of the first edition. He took a set of convoluted objectives for a broad exam and wrote the foundation of the study guide you now hold in your hands. This, the fifth edition, is indebted to his hard work and brilliance so early on.
Thanks are also due to Jeff Kellum, one of the best acquisitions editors in the business, and all of those at Wiley Publishing who worked on this title.
About the Author
Emmett Dulaney is a professor at Anderson University and the former director of training for Mercury Technical Solutions. He is a columnist for CertCities and the author of more than 30 books on certification and cross-platform integration. Emmett can be reached at .
Table of Exercises
Exercise 2-1 View the Active TCP and UDP Ports 37
Exercise 3-1 Install Snort in Linux 98
Exercise 4-1 Join Microsoft SpyNet Using Windows Defender 124
Exercise 4-2 View Running Processes on a Windows-Based Machine 127
Exercise 4-3 View Running Processing on a Linux-Based Machine 129
Exercise 4-4 Scanning with Microsoft Baseline Security Analyzer 157
Exercise 5-1 Validate a Trust Relationship 182
Exercise 6-1 Test Social Engineering 234
Exercise 7-1 Using Performance Monitor 250
Exercise 7-2 Turning a Guest Account Off 252
Exercise 7-3 Configuring Pop-up Blocker 270
Exercise 7-4 Configuring Windows Firewall 272
Exercise 7-5 Configuring Web Filtering 277
Exercise 7-6 Verifying the Presence of a TPM Chip in Windows Vista 281
Exercise 8-1 Encrypting a File System in Linux 296
Exercise 8-2 Hash Rules in Windows Server 2008 298