Get Certified Get Ahead

Search Site

Our goal is to help you Get Certified and Get Ahead in your career and your life. If you want to get certified, you’ll find that many of the free blog posts on this site can help you.

List of recent posts.

Security+

Number1

Key Security+ blog posts

A listing of over 100 blog posts on the Security+exam. Posts are organized into categories such as:

 

Get Certified Get Ahead

Network+

Key Network+ blog posts

Links to blog posts on the Network+ exam organized by topic similar to the Security+ blog link page.

Network+ N10-006 Practice Test Questions

Pass the Network+ Exam (N10-006) The First Time You Take It

At  $277, this exam is expensive.

Make sure you're ready before exam day!

Full bank of at least 293* realistic multiple choice practice test questions with in-depth explanations to help you pass the Network+ exam the first time you take it. This set also includes several performance-based questions.

 Network+ Study Materials

30 Day Package60 Day Package
Full bank of more than 293* N10-006 Network+ practice test questions.All questions include explanations so you'll know why the correct answers are correct, and why the incorrect answers are incorrect.CheckCheck
Performance-based QuestionsSeveral sets of performance-based questions. Question types include drag and drop, matching, and sorting type questions. See a demo here.checksmchecksm

Bonus #1

Flashcard Set
  • 200 Network+ Flashcards to reinforce key testable concepts
  • View in random and non-random modes.
checksm

Bonus #2

Subnetting mini-tutorial that will help you answer two key question types
  • Identify how many hosts a subnet supports
  • Identify valid IP addresses within a subnet
checksm

Get the Network+ Study Materials Here

All questions include explanations so you'll know why the correct answers are correct, and why the incorrect answers are incorrect. This way no matter how CompTIA words the questions, you'll be able to answer them correctly.Multiple quiz formats to let you use these questions based on the way you learn.
  • Learn mode. Learn mode allows you to keep selecting answers until you select the correct answer. Once you select the correct answer, you'll see the explanation.
  • Test mode. In test mode, you can only see the correct answers and explanations after you complete the test.
This package allows you to go through the practice test questions in multiple ways based on how you learn best.
  • Domain 1 through 5** using Learn Mode
  • Domain 1 through 5 using Test Mode (Randomized)
  • The full bank of test questions using Learn Mode
  • The full bank of questions using Test Mode (Randomized)

Test your readiness with these quality questions

Understand the important important concepts using the explanations

 Network+ Study Materials

30 Day Package60 Day Package
Full bank of more than 293* N10-006 Network+ practice test questions.All questions include explanations so you'll know why the correct answers are correct, and why the incorrect answers are incorrect.CheckCheck
Performance-based QuestionsSeveral sets of performance-based questions. Question types include drag and drop, matching, and sorting type questions. See a demo here.checksmchecksm

Bonus #1

Flashcard Set
  • 200 Network+ Flashcards to reinforce key testable concepts
  • View in random and non-random modes.
checksm

Bonus #2

Subnetting mini-tutorial that will help you answer two key question types
  • Identify how many hosts a subnet supports
  • Identify valid IP addresses within a subnet
checksm

Get the Network+ Study Materials Here

Package includes several sets of performance-based questions.Two sets are simulated performance-based questions.Another set includes multiple performance-based questions using drag and drop capabilities. I love the way these new questions work. Check out a demo here.

You don't need to spend a fortune to get quality practice test questions

If you're like most people, you've already spent money on one or more Network+ books or courses. Now you need to ensure you understand the concepts and how they are tested. You can pay $100 or more for practice test questions, but you don't need to.

The set of practice test questions will give you a view of typical multiple choice questions you can expect to see on the live exam.

Get Certified Get Ahead with Network+ Practice Test Questions

 Network+ Study Materials

30 Day Package60 Day Package
Full bank of more than 293* N10-006 Network+ practice test questions.All questions include explanations so you'll know why the correct answers are correct, and why the incorrect answers are incorrect.CheckCheck
Performance-based QuestionsSeveral sets of performance-based questions. Question types include drag and drop, matching, and sorting type questions. See a demo here.checksmchecksm

Bonus #1

Flashcard Set
  • 200 Network+ Flashcards to reinforce key testable concepts
  • View in random and non-random modes.
checksm

Bonus #2

Subnetting mini-tutorial that will help you answer two key question types
  • Identify how many hosts a subnet supports
  • Identify valid IP addresses within a subnet
checksm

Get the Network+ Study Materials Here

Beware of questions that do not include explanations - many people have identified errors in these and even when there aren't errors, these types of questions encourage you to memorize answers instead of understanding the underlying concepts.* Don't you hate those little asterisks. Normally they mean "forget what you just read, it's not really true." Not so here though. The bank starts with 293 multiple choice practice test questions, but I'm still adding to them. There will be more.** CompTIA identified five domains of objectives for the CompTIA Network+ exam. They are:
  • 1.0 Networking Architecture
  • 2.0 Network Operations
  • 3.0 Network Security
  • 4.0 Troubleshooting
  • 5.0 Industry Standards, Practices, and Network Theory



Security+ Full Access Package

Get Certified Get Ahead Security+

Pass the First Time!

Up-to-date Content

New multiple-choice and performance-based questions added regularly

Pass the first time with quality practice test questions, performance-based questions, flashcards, and audio.

Buy The Full Access Study Package Today

60 Days Access For Only $55.98

Need more time? You can easily renew for another 60 days at a significantly reduced price.

All materials are available online shortly after making your payment.

Get the Security+ Full Access Study Package Here

Our online Security+ study materials are the perfect complement to the CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide. They can also be used to help ensure you're ready no matter what study guide you're using.

This exam is expensive.

Make sure you're ready before exam day. 

Here's what you'll get:
  • All of the multiple-choice questions from the best-selling CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide. See a demo here. All questions have full explanations so you'll know why the correct answers are correct and why the incorrect answers are incorrect.
  • Over 35 new multiple-choice questions we've added after publishing the study guide.
  • Over 70 performance-based questions. See a demo here.
  • All of the flashcards from the study guide. View them in any Web browser.
  • All of the audio from the study guide. Listen to a sample here.
  • A subnetting mini-tutorial to help you answer key question types in the Security+ exam.
  • Access to a free discount code for 10% off your Security+ voucher. Save $31.10 off the US retail cost for this voucher.

Buy The Full Access Study Package Today

60 Days Access For Only $55.98

All materials are available online shortly after making your payment.

Get the Security+ Full Access Study Package Here

Recent Posts

  • Active VS Passive IDS Responses

    Active VS Passive IDS Responses

    An IDS can only detect an attack. It will respond after detecting an attack, and IDS responses can be either passive or active. If you’re planning to take the Security+ exam, you should have a basic understanding of appropriate tools and techniques to …
  • Beware Hurricane Related Scams

    Beware Hurricane Related Scams

    Beware of scammers that target both disaster victims and potential donors. US-CERT warns users to be watchful for various malicious cyber activity designed to take advantage of people after disasters. As an example, you should exercise caution when handling emails related …
  • Comparing Protocol IDs and Ports

    Comparing Protocol IDs and Ports

    Ports and protocol identifiers (protocol IDs) are not the same thing, though they are often confused. If you’re planning to take the Security+ exam, you should have a basic understanding of all relevant protocols and ports and know the difference between a …
  • Understanding Networking Protocols

    Understanding Networking Protocols

    Networking protocols provide the rules needed for computers to communicate with each other on a network. Some of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocols, such as TCP and IP, provide basic connectivity. If you’re planning to take the Security+ exam, …
  • Implementing Access Control Models

    Implementing Access Control Models

    Do you know the various access control models? You should if you’re planning to take the Security+ exam. This post should help. Here’s a sample practice test question: Q. An organization has implemented an access control model that enforces permissions based …
  • Data Labeling and Handling

    Data Labeling and Handling

    Data policies assist in the protection of data and help prevent data leakage. If you’re planning to take the Security+ exam, you should have a basic understanding of the different elements that may be contained in a data policy such as …
  • SY0-501 Study Guide

    SY0-501 Study Guide

    Woo Hoo! I’ve been working on the SY0-501 Study Guide for a few months now, but gratefully, the end is in sight. I’ve finished the content for the last chapter and expect everything to move much quicker at this point. I still …
  • Social Engineering Tactics

    Social Engineering Tactics

    Social engineers typically use one or more principles, which increase the effectiveness of their attacks. If you’re planning to take the Security+ exam, you should have a good understanding of these underlying principles of the different social engineering tactics. For example, can …
  • Comparing Application Attacks

    Comparing Application Attacks

    Are you familiar with various types of application attacks? If you’re planning to take the Security+ exam, you should have a basic understanding of several common types of attacks launched against systems and networks. For example, can you answer this question? Q. …
  • Security Method Using Digital Signatures

    Security Method Using Digital Signatures

    Cryptography provides two primary security methods you can use with email: digital signatures and encryption.  If you’re planning to take the Security+ exam, you should understand that these are separate processes, but you can digitally sign and encrypt the same email. …
  • /32 in an ACL

    /32 in an ACL

    I’ve recently fielded a few queries on the usage of /24 versus /32 in an access control list (ACL) rule. As an example, consider this practice test question: Q. You need to configure a firewall to allow traffic from Homer’s …
  • Hash-based Message Authentication Code

    Hash-based Message Authentication Code

    Integrity verifies that data has not been modified. If you’re planning to take the Security+ exam, you should have a basic understanding of appropriate cryptographic methods. This includes using hash-based message authentication code that provides both integrity and authenticity of messages. …
  • Comparing Risks & Vulnerabilities

    Comparing Risks & Vulnerabilities

    As a security professional, you need to be aware of the different security issues associated with threats, vulnerabilities, and risks, and the tools available to combat them.  If you’re planning to take the Security+ exam, risks and vulnerabilities are important topics …
  • I Am Happy

    I Am Happy

    I am happy. There’s just no other way to say it. My wife and I recently returned from a long overdue vacation. We had an awesome time on an Alaska cruise. We saw whales, otters, seals, eagles, glaciers, and more. …
  • Security Using Door Access System

    Security Using Door Access System

    A door access system should allow personnel to exit without any form of authentication, especially if the systems lose power such as during a fire. If you’re planning to take the Security+ exam you should have a basic understanding of physical security …

Now Available
CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide

Number1Amazon

Active VS Passive IDS Responses

Posted by on September 18 in Security+ | 0 comments

An IDS can only detect an attack. It will respond after detecting an attack, and IDS responses can be either passive or active. If you’re planning to take the Security+ exam, you should have a basic understanding of appropriate tools and techniques to discover security threats and vulnerabilities.

For example, can you answer this question?

Q. A security company wants to gather intelligence about current methods attackers are using against its clients. What can it use?

A. Vulnerability scan

B. Honeynet

C. MAC address filtering

D. Evil twin

More, do you know why the correct answer is correct and the incorrect answers are incorrect? The answer and explanation is available at the end of this post.

Get Certified Get Ahead

IDS Responses

An IDS will respond after detecting an attack, and the response can be either passive or active. A passive response primarily consists of logging and notifying personnel, whereas an active response also changes the environment to block the attack:

  • Passive IDS. A passive IDS logs the attack and may also raise an alert to notify someone. Most IDSs are passive by default. The notification can come in many forms, including an email, a text message, a pop-up window, or a notification on a central monitor.
  • Active IDS. An active IDS logs and notifies personnel just as a passive IDS does, but it can also change the environment to thwart or block the attack. For example, it can modify access control lists (ACLs) on firewalls to block offending traffic, close processes on a system that were caused by the attack, or divert the attack to a safe environment, such as a honeynet or honeypot.

Active VS Passive IDS Responses

Remember this

Honeypots and honeynets attempt to divert attackers from live networks. They give security personnel an opportunity to observe current methodologies used in attacks, and gather intelligence on these attacks.

CompTIA Security+ Study Guide (SY0-401)

The 401 Version of the Study Guide is Now Available

SY0-401 Study GuideThe CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide is an update to the top-selling SY0-201 and SY0-301 study guides, which have helped thousands of readers pass the exam the first time they took it.

CompTIA Authorized Quality Content (CAQC)After a comprehensive review by ProCert Labs, the SY0-401 version has been certified as CompTIA Approved Quality Content (CAQC) and covers every aspect of the SY0-401 exam.

It includes the same elements readers raved about in the previous two versions.

Each of the eleven chapters presents topics in an easy to understand manner and includes real-world examples of security principles in action.

You’ll understand the important and relevant security topics for the Security+ exam, without being overloaded with unnecessary details. Additionally, each chapter includes a comprehensive review section to help you focus on what’s important.


Click for Free Preview


Over 400 realistic practice test questions with in-depth explanations will help you test your comprehension and readiness for the exam. The book includes:

  • A 100 question pre-test
  • A 100 question post-test
  • Practice test questions at the end of every chapter.

Each practice test question includes a detailed explanation to help you understand the content and the reasoning behind the question. You’ll be ready to take and pass the exam the first time you take it.

If you plan to pursue any of the advanced security certifications, this guide will also help you lay a solid foundation of security knowledge. Learn this material, and you’ll be a step ahead for other exams. This SY0-401 study guide is for any IT or security professional interested in advancing in their field, and a must read for anyone striving to master the basics of IT security.

Kindle edition also available.

Counterattacks

An active response IDS would rarely perform a counterattack against the attacker. Some network security professionals specialize in attacks or counterattacks, but regular administrators should avoid them.

Consider basic human nature. If one person bumps into another in a crowd, the second person could simply ignore it or give a smile and a nod indicating “no problem,” and the event is over. On the other hand, if the response is an aggressive push accompanied by some loud words, the event escalates. It can turn ugly quickly. Now, compare this to some basic facts about attackers today:

  • Attackers are dedicated. Attackers aren’t just bored teenagers passing their time away like Matthew Broderick in the movie War Games. Most attackers today are dedicated criminals working in a semiskilled profession. This is similar to a seasoned car thief with specific skills to break into and steal cars. They are often very good at what they do. Attackers’ skills steadily increase, and their tools are becoming more and more sophisticated.
  • Attackers have unlimited time. Attackers usually have the luxury of spending 100 percent of their time on attack strategies and methodologies. Compare this with network administrators, who have a host of other duties and rarely can spend 100 percent of their time on security.

Many administrators certainly have the expertise to investigate an attack, trace an IP address back, and launch a counterattack. However, just because you can doesn’t mean you should. The attacker will likely detect the counterattack and escalate the attack. Instead of moving on from your network, the attacker might take your attack personally and consider it a lifelong mission to cripple your network.

It’s also highly likely that the attacking IP address is not the actual attacker. Very often, attackers hijack the machines of unwitting users and launch attacks from their systems. If you counterattack, you could be attacking the wrong computer.


Full Security+ Course

Full Security+ Course Now Available

Helping you Pass the First Time

Online access includes all of the content from the

CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide

  • Introduction
  • About the exam (including types of questions and strategies for performance-based questions)
  • 100 question pre-assessment exam
  • Mastering Security Basics (full content from Chapter 1 of the study guide including the exam topic review and 20 practice test questions)
  • Exploring Control Types and Methods (full content from Chapter 2 of the study guide including the exam topic review and 20 practice test questions)
  • Understanding Basic Network Security (full content from Chapter 3 of the study guide including the exam topic review and 20 practice test questions)
  • Securing Your Network (full content from Chapter 4 of the study guide including the exam topic review and 20 practice test questions)
  • Securing Hosts and Data (full content from Chapter 5 of the study guide including the exam topic review and 20 practice test questions)
  • Understanding Malware and Social Engineering (full content from Chapter 6 of the study guide including the exam topic review and 20 practice test questions)
  • Identifying Advanced Attacks (full content from Chapter 7 of the study guide including the exam topic review and 20 practice test questions)
  • Managing Risk (full content from Chapter 8 of the study guide including the exam topic review and 20 practice test questions)
  • Preparing for Business Continuity (full content from Chapter 9 of the study guide including the exam topic review and 20 practice test questions)
  • Understanding Cryptography (full content from Chapter 10 of the study guide including the exam topic review and 20 practice test questions)
  • Exploring Operational Security (full content from Chapter 11 of the study guide including the exam topic review and 20 practice test questions)
  • 100 question post-assessment exam
  • Security+ Acronyms

Get the Full Security+ Course Here

 Full Security+ Course Now Available


Test your readiness with these quality materials

Random 100-question tests

Random practice tests from the all of the practice test questions in the CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide. All questions include explanations so you'll know why the correct answers are correct, and why the incorrect answers are incorrect.

34 Simulated Performance-based Questions

Eight sets of performance-based questions with multiple questions in each set. These questions help you understand and prepare for performance based questions.

22 Realistic Performance-based Questions

Two new sets of performance-based questions with a total of 22 questions. These new questions use a new testing engine that includes realistic drag and drop, matching, sorting, and fill in the blank questions.

Flashcard Set

  • 273 Security+ Flashcards to reinforce key testable concepts
  • 280 Security+ acronyms flashcards to help you master the required acronyms
  • 204 Security+ Remember This slides

Audio - SY0-401 Security+ Remember This Audio Files

Learn by Listening. Over one hour and 15 minutes of audio (MP3 downloads.)

Audio - SY0-401 Security+ Question and Answer Audio Files

Learn by Listening. Over three hours hour and 15 minutes of audio (MP3 downloads.)

Bonus #1

Audio from the end of chapter reviews from each of the chapters in the CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide. Over one hour and 15 minutes of additional audio.

Bonus #2

Subnetting mini-tutorial that will help you answer two key question types:
  • Identify how many hosts a subnet supports
  • Identify valid IP addresses within a subnet

Bonus #3 

Access the study materials for a total of 60 days because sometimes life happens.

Get the Full Security+ Course Here

Q. A security company wants to gather intelligence about current methods attackers are using against its clients. What can it use?

A. Vulnerability scan

B. Honeynet

C. MAC address filtering

D. Evil twin

Answer is B. A honeynet is a fake network designed to look valuable to attackers and can help security personnel learn about current attack methods. In this scenario, the security company can install honeynets in its customers’ networks to lure the attackers.

A vulnerability scan detects vulnerabilities, but attackers may not try to exploit them.

Media access control (MAC) address filtering is a form of network access control, but can’t be used to detect or learn about attacks.

An evil twin is a rogue access point with the same SSID as an authorized access point.

See Chapter 4 of the CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide for more information securing network.

CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide

Subscribe To Our Newsletter

Join our mailing list and get a free excerpt of the CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide.  This excerpt includes the introduction and Chapter 1. 

You have Successfully Subscribed!

Get Certified Get Ahead is a participant in the Amazon Services LLC Associates Program,
an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to amazon.com.

Copyright © 2015 Get Certified Get Ahead. All Rights Reserved.