Something GA
You’ve been asked to build a gaming system that should include a monitor with a native LCD resolution of 1600×1200. What is the name of this display resolution?
You’ve been asked to build a gaming system that should include a monitor with a native LCD resolution of 1600×1200. What is the name of this display resolution?
You are installing a new server into a large data center, but you’ve not been provided with any power information about the data center or the server. Which of these would be the best way to proceed?
Put the power in the server and drink them both up Read More »
You would like to encrypt one of your important spreadsheets, but you want all other files on your hard drive to be normally readable. What type of Windows encryption can be applied to this single file?
One of your Windows 7 systems appears to be infected with malware that is causing a Windows STOP error (BSOD) just after login. Which of these troubleshooting tasks would be the best next step?
The generation of digital certificates is a staple of any PKI. In this video, you’ll learn how to build a set of public and private keys in GPG.
CompTIA Security+ SY0-301: 6.4 – Implementing Public and Private Keys Read More »
The key recovery is a critical aspect of any PKI. In this video, you’ll learn how to create a Key Recovery Agent certificate to use in a Microsoft Active Domain environment.
CompTIA Security+ SY0-301: 6.4 – Implementing Key Recovery Read More »
Implementing a proper PKI involves a combination of process and software. In this video, you’ll see how to use Microsoft Certificate Services and the Microsoft Management Console to create and approve certificate requests.
CompTIA Security+ SY0-301: 6.4 – Implementing PKI Read More »
The implementation of digital certificates can vary depending on the environment, but the overall process is relatively similar. In this video, you’ll see how Microsoft Certificate Services can be used to manage a PKI implementation.
CompTIA Security+ SY0-301: 6.4 – Implementing Digital Certificates Read More »
The implementation of a key revocation process may vary depending on your PKI. In this video, you’ll learn how to use CRLs and the process for revoking a key used in a web-of-trust environment.
CompTIA Security+ SY0-301: 6.4 – Implementing Key Revocation Read More »
Implementing a certificate authority can include both commercial and private certificate authorities. In this video, you’ll learn the differences and similarities between a commercial and private CA.
CompTIA Security+ SY0-301: 6.4 – Implementing Certificate Authorities Read More »