| 9.1% |
Identify common threats to network security. |
20% |
20% |
20% |
20% |
20% |
20,
20,
20,
20,
20
|
|
| 9.1% |
Explain how Kerberos, CHAP, certificates, tokens, and biometrics enhance security. |
20% |
20% |
20% |
20% |
20% |
20,
20,
20,
20,
20
|
|
| 9.1% |
Differentiate between common attacks such as DDos, Man-in-the-middle, spoofing, session hijacking, and software exploitation. |
25% |
25% |
25% |
25% |
0% |
25,
25,
25,
25,
0
|
|
| 9.1% |
Secure a network to permit remote access via VPN. |
25% |
25% |
25% |
25% |
0% |
25,
25,
25,
25,
0
|
|
| 9.1% |
Understand and mitigate common e-mail vulnerabilities. |
25% |
25% |
25% |
25% |
0% |
25,
25,
25,
25,
0
|
|
| 9.1% |
Understand and plan for Web security via browser configuration. |
20% |
20% |
20% |
20% |
20% |
20,
20,
20,
20,
20
|
|
| 9.1% |
Share files in a secure manner using Sharing and NTFS permissions. |
20% |
20% |
20% |
20% |
20% |
20,
20,
20,
20,
20
|
|
| 9.1% |
Apply security to a wireless access point, including non-broadcast of SSID, use of WPA, and configuration of shared keys. |
50% |
25% |
0% |
25% |
0% |
50,
25,
0,
25,
0
|
|
| 9.1% |
Secure network devices such as servers, switches, and routers. |
50% |
25% |
0% |
25% |
0% |
50,
25,
0,
25,
0
|
|
| 9.1% |
Understand and implement physical security of assets. |
20% |
20% |
20% |
20% |
20% |
20,
20,
20,
20,
20
|
|
| 9.1% |
Explain how to create and maintain a basic security policy, including disaster recovery. |
20% |
20% |
20% |
20% |
20% |
20,
20,
20,
20,
20
|
|