What is a Firewall?
Types of Firewalls:
Configuring Rules:
Encryption Protocols:
Security Measures:
What is a VPN?
Types of VPN Protocols:
Local Accounts:
Domain Accounts:
Multi-Factor Authentication (MFA):
File and Folder Permissions:
Group Permissions:
User Account Control (UAC):
Disk Encryption:
Data Encryption During Transmission:
Types of Backups:
Backup Tools:
Regular Patch Updates:
Installing and Using Antivirus Software:
Configuring Account Lockout Policies:
This section focuses on securing systems and data. As a beginner, start by learning to configure a firewall, set up a VPN, and understand how permissions work. Regularly practice identifying and responding to threats in a safe, controlled environment to build confidence and expertise.
Network firewalls and host-based firewalls can allow or block traffic based on port numbers.
Example:
Allow TCP 80 (HTTP) and TCP 443 (HTTPS) for web browsing.
Block all other unnecessary ports like TCP 21 (FTP) or UDP 137–139 (NetBIOS) to reduce risk.
This security model blocks all traffic by default, and only allows explicitly permitted connections.
Often described as "deny all unless permitted".
Used in high-security environments (e.g., financial systems, healthcare).
Must be carefully managed to avoid accidentally blocking legitimate services.
Exam Tip: Know that most firewalls can work on an "allow list" model and that a "default deny" strategy is considered more secure than "default allow".
In systems like Windows NTFS, child objects inherit permissions from parent folders.
Inherited permissions flow automatically unless explicitly overridden.
Common Use Case:
Note: Overriding inherited permissions can introduce complexity, so documentation is important.
Administrator Account:
Full system control.
Can install/remove software, manage user accounts, and modify system settings.
Standard User:
Can run applications and modify their own settings.
Requires admin credentials to install software or make system changes.
Guest Account:
Very limited access.
Typically used for temporary logins.
Disabled by default in most recent Windows versions due to security concerns.
Refers to storing data in a physically separate location to protect against local disasters.
Often used in combination with on-site backups.
Uses online services to back up files automatically.
Provides:
Redundancy
Version control
Remote access
Examples: Google Drive, OneDrive, iCloud, Dropbox, Backblaze.
Security Consideration:
Cloud backups should be encrypted both in transit and at rest.
Multi-factor authentication (MFA) should be used for account access.
A type of stealth malware that hides its existence while granting privileged access.
Difficult to detect with standard antivirus software because it loads before the OS or masks its processes.
Detection/Removal:
Software or hardware that records keystrokes to capture login credentials, financial information, or other sensitive data.
Often delivered via phishing emails, drive-by downloads, or trojanized apps.
Detection:
Involves forging the sender address of an email to make it appear as if it came from a trusted source.
Common in phishing and social engineering attacks.
Indicators of Spoofing:
Unusual sender address or domain
Mismatched headers (e.g., “From” and “Reply-To” don’t match)
Suspicious grammar or urgency
Preventive Tools:
SPF, DKIM, and DMARC records for domain validation
Email filtering and anti-spam software
Definition: Users and applications should have only the minimum access rights required to perform their tasks.
Helps reduce the attack surface and limit damage from compromised accounts.
Examples:
HR staff should not have admin rights on their PCs.
A software app should not run with root/administrator access unless necessary.
Unused network features and services should be disabled or removed to reduce vulnerabilities.
Examples:
Disable SMBv1, which is outdated and vulnerable.
Turn off file and printer sharing if not needed.
Close open ports using firewall rules or service settings.
Regular audits and vulnerability scans help identify unneeded services and ensure proper configuration.
Which wireless security protocol is considered the most secure for modern Wi-Fi networks?
WPA3.
WPA3 is the newest Wi-Fi security protocol and improves upon WPA2 with stronger authentication and encryption mechanisms. One of the major improvements is Simultaneous Authentication of Equals (SAE), which replaces the WPA2 Pre-Shared Key authentication method. SAE helps prevent offline dictionary attacks that attempt to guess Wi-Fi passwords from captured traffic.
Another improvement is forward secrecy, which ensures that previously captured wireless traffic cannot be decrypted even if the network password becomes known later. WPA3 also strengthens encryption for open networks using Opportunistic Wireless Encryption (OWE).
When configuring wireless networks, technicians should prioritize WPA3 when both access points and client devices support it. If compatibility issues exist, WPA2 may still be used but is gradually being phased out as WPA3 adoption increases.
Demand Score: 81
Exam Relevance Score: 88
What type of malware disguises itself as legitimate software to trick users into installing it?
Trojan.
A Trojan is malware that appears to be legitimate software but contains hidden malicious code. It relies on social engineering rather than automatic spreading to infect systems. Users may install a Trojan believing it is a useful program, such as a free utility or software update.
Once installed, the Trojan may create a backdoor, allowing attackers remote access to the system. It may also download additional malware, steal credentials, or monitor user activity.
Unlike viruses and worms, Trojans typically do not replicate themselves automatically. The infection usually occurs because the user intentionally runs the malicious program. For technicians troubleshooting compromised systems, examining recently installed programs and unexpected system behavior is an important step in identifying Trojan infections.
Demand Score: 74
Exam Relevance Score: 84
Which Windows feature allows administrators to encrypt files so that only authorized users can access them?
Encrypting File System (EFS).
Encrypting File System (EFS) is a Windows feature that allows users to encrypt individual files and folders on NTFS volumes. Once encrypted, the files can only be accessed by the user account that performed the encryption or by authorized recovery agents.
EFS uses public-key encryption tied to the user's certificate. Even if another user logs into the same computer or accesses the disk from another operating system, they cannot read the encrypted files without the correct key.
A common mistake is confusing EFS with BitLocker. BitLocker encrypts the entire drive, protecting data if the device is stolen, while EFS protects specific files within the operating system environment.
Demand Score: 70
Exam Relevance Score: 86
Which authentication factor category does a fingerprint scanner belong to?
Something you are.
Authentication factors are commonly grouped into three categories: something you know, something you have, and something you are. A fingerprint scanner is a biometric authentication method and therefore belongs to the “something you are” category.
Biometric authentication verifies physical characteristics unique to an individual, such as fingerprints, facial recognition, or iris scans. These factors are difficult to replicate and are often used in multi-factor authentication systems to increase security.
Combining biometrics with other factors, such as a password or security token, significantly strengthens authentication security. In enterprise environments, biometric authentication is commonly used for device login or secure facility access.
Demand Score: 72
Exam Relevance Score: 85
Which type of attack attempts to guess a password by systematically trying many combinations?
Brute-force attack.
A brute-force attack is a method used by attackers to gain unauthorized access by systematically trying many password combinations until the correct one is found. Automated tools can attempt thousands or millions of guesses rapidly.
Weak passwords, short passwords, and common dictionary words make brute-force attacks significantly easier. Attackers often combine brute-force techniques with password dictionaries to accelerate the guessing process.
Security controls such as account lockout policies, multi-factor authentication, and strong password complexity requirements help reduce the effectiveness of brute-force attacks. Monitoring authentication logs for repeated failed login attempts is also an important defensive practice.
Demand Score: 76
Exam Relevance Score: 87