Comptia Security+ (2008 Edition) Certification Examination Objectives
Comptia Security+ (2008 Edition) Certification Examination Objectives
Comptia Security+ (2008 Edition) Certification Examination Objectives
Examination Objectives
INTRODUCTION
The CompTIA Security+ (2008 Edition) Certification is a vendor neutral credential. The Security+ exam is
an internationally recognized validation of foundation-level security skills and knowledge, and is used by
organizations and security professionals around the globe.
The skills and knowledge measured by this examination are derived from an industry-wide Job Task
Analysis (JTA) and were validated through a global survey in Q4, 2007. The results of this survey were
used to validate the content of the domains and objectives and the overall domain weightings, ensuring the
relative importance of the content.
The CompTIA Security+ (2008 Edition) Certification is aimed at an IT security professional who has:
The table below lists the domain areas measured by this examination and the approximate extent
to which they are represented in the examination:
Domain % of Examination
1.0 Systems Security 21%
2.0 Network Infrastructure 20%
3.0 Access Control 17%
4.0 Assessments & Audits 15%
5.0 Cryptography 15%
6.0 Organizational Security 12%
Total 100%
**Note: The lists of examples provided in bulleted format below each objective are not exhaustive
lists. Other examples of technologies, processes or tasks pertaining to each objective may also
be included on the exam although not listed or covered in this objectives document.
(A list of acronyms used in these Objectives appears at the end of this document.)
1.2 Explain the security risks pertaining to system hardware and peripherals.
• BIOS
• USB devices
• Cell phones
• Removable storage
• Network attached storage
2.1 Differentiate between the different ports & protocols, their respective threats
and mitigation techniques.
• Antiquated protocols
• TCP/IP hijacking
• Null sessions
• Spoofing
• Man-in-the-middle
• Replay
• DOS
• DDOS
• Domain Name Kiting
• DNS poisoning
• ARP poisoning
2.3 Determine the appropriate use of network security tools to facilitate network
security.
• NIDS
• NIPS
• Firewalls
• Proxy servers
• Honeypot
• Internet content filters
• Protocol analyzers
2.5 Explain the vulnerabilities and mitigations associated with network devices.
• Privilege escalation
• Weak passwords
• Back doors
• Default accounts
• DOS
CompTIA Security+ (2008 Edition) Exam Objectives 3 of 11
Copyright 2008 by the Computing Technology Industry Association. All rights reserved.
The CompTIA Security+ (2008 Edition) Exam Objectives are subject to change without notice.
2.6 Explain the vulnerabilities and mitigations associated with various
transmission media.
• Vampire taps
2.7 Explain the vulnerabilities and implement mitigations associated with wireless
networking.
• Data emanation
• War driving
• SSID broadcast
• Blue jacking
• Bluesnarfing
• Rogue access points
• Weak encryption
3.1 Identify and apply industry best practices for access control methods.
• Implicit deny
• Least privilege
• Separation of duties
• Job rotation
3.2 Explain common access control models and the differences between each.
• MAC
• DAC
• Role & Rule based access control
3.3 Organize users and computers into appropriate security groups and roles
while distinguishing between appropriate rights and privileges.
3.6 Summarize the various authentication models and identify the components of
each.
• One, two and three-factor authentication
• Single sign-on
3.7 Deploy various authentication models and identify the components of each.
• Biometric reader
• RADIUS
• RAS
4.3 Within the realm of vulnerability assessments, explain the proper use of
penetration testing versus vulnerability scanning.
4.4 Use monitoring tools on systems and networks and detect security-related
anomalies.
• Performance monitor
• Systems monitor
• Performance baseline
• Protocol analyzers
5.0 Cryptography
5.2 Explain basic hashing concepts and map various algorithms to appropriate
applications.
• SHA
• MD5
• LANMAN
• NTLM
5.3 Explain basic encryption concepts and map various algorithms to appropriate
applications.
• DES
• 3DES
• RSA
• PGP
• Elliptic curve
• AES
• AES256
• One time pad
• Transmission encryption (WEP TKIP, etc)
6.6 Explain the concept of and how to reduce the risks of social engineering.
• Phishing
• Hoaxes
• Shoulder surfing
• Dumpster diving
• User education and awareness training