Practice Exams:

Uncategorized

CompTIA CASP+ CAS-004 – Chapter 06 – Utilizing Security Assessments and Incident Response

Chapter Introduction In this chapter, we’re going to be looking at utilizing security assessments as well as discussing incident response policies and procedures. In any situation that you are going to be applying security, one of the first steps is going to be performing security assessments. In this chapter, we’ll be discussing those security assessments and the importance of them, as well as different procedures like sandboxing, memory dumping, runtime, Dugging reconnaissance, et cetera. We’ll also be looking at the different security assessment tools and types of security assessments that…

Read More

CompTIA CASP+ CAS-004 – Course Introduction

Course Introduction This is the certified advanced security practitioner course. It is a step above Security Plus for those who want to get into the industry as security professionals. This is the current version of the CASP exam, version three. In this course we’re going to start with understanding risk management. Risk is inevitable in every organization and as security professionals we need to be aware of how how to plan for risk and how to implement risk management proceedings. So we’ll be talking about things like threats and vulnerabilities,…

Read More

DA-100 Microsoft Power BI – Level 1: Creating and formatting a table visualization

Welcome to Part 1: Visualizations Well, welcome to part one of this course all about visualizations. So now we have installed Power Bi desktop. We can create our first visualizations. But before we do that, it would probably be useful just to see what we’re going to learn in this part one. What you’re seeing on screen are the requirements for the DA Dash 100 exam and you can see that they are broadly in sections. We have got sections one to three which are get and transform using the…

Read More

DA-100 Microsoft Power BI – Level 2: Formatting our first visualization Part 2

8g. Align visuals Now in the last video we copied a visualization and put it on top of a second one. In this video we’re going to see what we can do with multiple visualizations. First of all, I’m just going to take one visualization and you’ll see that when I click on a particular visualization. First of all, we have all of these markers around which denote that it has been selected. But secondly, we got this new Visual Tools menu which only appears when I select a visualization….

Read More

DA-100 Microsoft Power BI – Level 2: Formatting our first visualization

Formatting font and font size Now, in the previous video, we created our first visualization, but it doesn’t actually look that good. So what we’re going to do is format it. We’re going to change things like the color and the size and other things. Now, in this visualizations pane, we have got three buttons here, field format and analytics. So they’re buttons or icons. They may look slightly different in your version. For instance, if you have an older version of Power Bi, then this middle paint brush looks…

Read More

DA-100 Microsoft Power BI – Level 3: 8a. Creating different visualizations: Matrices and bar charts Part 2

Clustered and 100% Stacked bar charts Now, in the previous videos, we’ve had a look at stacked bar and column charts, and the essence of these is that the individual elements get put on top of each other. So this item, which is 17,000, gets put on top of another one, which is 33,000, and together they get to the 50,000 line. But suppose you wanted each to be on an individual space. Well, you can do that with the clustered column charts. So if I just select this particular…

Read More

DA-100 Microsoft Power BI – Level 3: 8a. Creating different visualizations: Matrices and bar charts

Matrix Hello and welcome to level three. And in level three we will be looking at different types of visualizations and we’ll be concentrating on bar charts and area charts towards the end line charts but we’ll be starting off with a matrix. So what is a matrix? Well, if you have got any experience with Excel then you’ll know them as pivot tables. So if you have a look at our existing table matrix you’ll see that it has a range of values, in this case region name, sales…

Read More

CompTIA CASP+ CAS-004 – Chapter 02 – Network and Security Components and Architecture Part 5

Topic F: Advanced Configuration of Network Devices In this topic, we’re going to be looking at the advanced configuration of network devices. Devices like routers and switches and some other devices will often require some additional configuration in order to ensure their security. Additional Configurations When you’re configuring layer three devices like routers, layer two devices like switches, possibly wireless access points and other network devices, there are some specific advanced configurations that are required in order to adequately secure the systems that those devices support. And so we’re going…

Read More

CompTIA CASP+ CAS-004 – Chapter 02 – Network and Security Components and Architecture Part 4

Network Flow Configuration lockdown is also known as system lockdown. This is a setting that can be implemented on various devices like servers, routers switches, firewalls, virtual host or hypervisors. You set it on the device after the device is correctly configured and what it does is it prevents any changes to the configuration and so that definitely helps to support change control. This even includes users that would have the right to configure the device. Now, before you do this you need to make sure everything’s working right. We…

Read More

CompTIA CASP+ CAS-004 – Chapter 02 – Network and Security Components and Architecture Part 3

IP Security (IPSec) So we mentioned IPsec here a couple of times, but we need to dig into this a little bit more. IPsec is actually a suite of protocols much like TCP IP is. It has a number of different components that you need to be familiar with. But as important as that is, you also need to understand what it does. It can provide encryption and therefore data confidentiality. It can provide data digital signatures and therefore data integrity as well as mutually authenticating both sides of a…

Read More