Tag: secure

Security+ Pop Quiz: Turns out it’s not as secure as I remember

Security+ Pop Quiz: Turns out it’s not as secure as I remember

Continue Reading

Network+ Pop Quiz: Those cats were fast as symmetric encryption

Network+ Pop Quiz: Those cats were fast as symmetric encryption

Continue Reading

Network+ Pop Quiz: The last place I looked

Network+ Pop Quiz: The last place I looked

Which of the following would be considered a secure protocol?

Continue Reading

Network+ Pop Quiz: It’s not you, it’s me

Network+ Pop Quiz: It’s not you, it’s me

Which of these would be the best reason to use a secure protocol?

Continue Reading

Basic Forensic Concepts – CompTIA Network+ N10-006 – 3.7

Basic Forensic Concepts – CompTIA Network+ N10-006 – 3.7

Last modified on May 20th, 2015 at 3:43 pm

The basics of forensics are important topics for any technologist. In this video, you’ll learn about first responders, legal hold, eDiscovery, data collection, chain of custody, and much more.

Continue Reading

Using Secure Protocols – CompTIA Network+ N10-006 – 3.3

Using Secure Protocols – CompTIA Network+ N10-006 – 3.3

Last modified on May 20th, 2015 at 3:41 pm

The traffic we send across the network is subject to viewing by anyone along the way. In this video, you’ll learn about which protocols and services should be used to ensure a secure communications channel.

Continue Reading

I need a candle

I need a candle

Which of these two protocols would allow for secure communication?

Continue Reading

Let’s start this meeting with a grande drip of the bold

Let’s start this meeting with a grande drip of the bold

Last modified on August 13th, 2012 at 9:40 am

You need a way to securely connect back to your corporate resources while you are away from the office. Which of these network technologies would be the best choice for this requirement?

Continue Reading

How can you secure your computer’s hardware configuration?

How can you secure your computer’s hardware configuration?

Last modified on August 13th, 2012 at 5:17 pm

You’re planning to disable the USB port on all of the computers in your organization, but you’re concerned about your end user community re-enabling the ports on individual systems. What’s the easiest way to ensure that the hardware changes are protected from any end-user modifications?

Continue Reading

X