Tag: secure

Security+ Pop Quiz: Turns out it’s not as secure as I remember

Security+ Pop Quiz: Turns out it’s not as secure as I remember

| May 7, 2020

Continue Reading

Network+ Pop Quiz: Those cats were fast as symmetric encryption

Network+ Pop Quiz: Those cats were fast as symmetric encryption

| October 3, 2017

Continue Reading

Network+ Pop Quiz: The last place I looked

Network+ Pop Quiz: The last place I looked

| June 13, 2016

Which of the following would be considered a secure protocol?

Continue Reading

Network+ Pop Quiz: It’s not you, it’s me

Network+ Pop Quiz: It’s not you, it’s me

| June 8, 2016

Which of these would be the best reason to use a secure protocol?

Continue Reading

Basic Forensic Concepts – CompTIA Network+ N10-006 – 3.7

Basic Forensic Concepts – CompTIA Network+ N10-006 – 3.7

| May 3, 2015 | 0 Comments

The basics of forensics are important topics for any technologist. In this video, you’ll learn about first responders, legal hold, eDiscovery, data collection, chain of custody, and much more.

Continue Reading

Using Secure Protocols – CompTIA Network+ N10-006 – 3.3

Using Secure Protocols – CompTIA Network+ N10-006 – 3.3

| May 2, 2015 | 0 Comments

The traffic we send across the network is subject to viewing by anyone along the way. In this video, you’ll learn about which protocols and services should be used to ensure a secure communications channel.

Continue Reading

I need a candle

I need a candle

| September 25, 2012

Which of these two protocols would allow for secure communication?

Continue Reading

Let’s start this meeting with a grande drip of the bold

Let’s start this meeting with a grande drip of the bold

| January 24, 2012

You need a way to securely connect back to your corporate resources while you are away from the office. Which of these network technologies would be the best choice for this requirement?

Continue Reading

How can you secure your computer’s hardware configuration?

How can you secure your computer’s hardware configuration?

| September 28, 2009

You’re planning to disable the USB port on all of the computers in your organization, but you’re concerned about your end user community re-enabling the ports on individual systems. What’s the easiest way to ensure that the hardware changes are protected from any end-user modifications?

Continue Reading

X