{"aaData":[[1,"Given a scenario, analyze indicators of compromise and determine the type of malware<\/a>","0"],[2,"Viruses<\/a>","0"],[3,"Crypto-malware<\/a>","0"],[4,"Ransomware<\/a>","0"],[5,"Worm<\/a>","0"],[6,"Trojan<\/a>","0"],[7,"Rootkit<\/a>","0"],[8,"Keylogger<\/a>","0"],[9,"Adware<\/a>","0"],[10,"Spyware<\/a>","0"],[11,"Bots<\/a>","0"],[12,"RAT<\/a>","0"],[13,"Logic bomb<\/a>","0"],[14,"Backdoor<\/a>","0"],[15,"Compare and contrast types of attacks<\/a>","0"],[16,"Social engineering<\/a>","0"],[17,"Phishing<\/a>","0"],[18,"Spear phishing<\/a>","0"],[19,"Whaling<\/a>","0"],[20,"Vishing<\/a>","0"],[21,"Tailgating <\/a>","0"],[22,"Impersonation<\/a>","0"],[23,"Dumpster diving<\/a>","0"],[24,"Shoulder surfing<\/a>","0"],[25,"Hoax<\/a>","0"],[26,"Watering hole attack<\/a>","0"],[27,"Principles (reasons for effectiveness)<\/a>","0"],[28,"Authority<\/a>","0"],[29," Intimidation<\/a>","0"],[30,"Consensus<\/a>","0"],[31,"Scarcity<\/a>","0"],[32,"Familiarity<\/a>","0"],[33,"Trust<\/a>","0"],[34,"Urgency<\/a>","0"],[35,"Application\/service attacks<\/a>","0"],[36,"DoS<\/a>","0"],[37,"DDoS<\/a>","0"],[38,"Man-in-the-middle<\/a>","0"],[39,"Buffer overflow<\/a>","0"],[40,"Injection<\/a>","0"],[41,"Cross-site scripting<\/a>","0"],[42,"Cross-site request forgery<\/a>","0"],[43,"Privilege escalation<\/a>","0"],[44,"ARP poisoning<\/a>","0"],[45,"Amplification<\/a>","0"],[46,"DNS poisoning<\/a>","0"],[47,"Domain hijacking<\/a>","0"],[48,"Man-in-the-browser<\/a>","0"],[49,"Zero day<\/a>","0"],[50,"Replay<\/a>","0"],[51,"Pass the hash<\/a>","0"],[52,"Hijacking and related attacks<\/a>","0"],[53,"Clickjacking<\/a>","0"],[54,"Session hijacking<\/a>","0"],[55,"URL hijacking<\/a>","0"],[56,"Typo squatting<\/a>","0"],[57,"Driver manipulation<\/a>","0"],[58,"Shimming<\/a>","0"],[59,"Refactoring<\/a>","0"],[60,"MAC spoofing<\/a>","0"],[61,"IP spoofing<\/a>","0"],[62,"Wireless attacks<\/a>","0"],[63,"IV<\/a>","0"],[64,"Evil twin<\/a>","0"],[65,"Rogue AP<\/a>","0"],[66,"Jamming<\/a>","0"],[67,"WPS<\/a>","0"],[68,"Bluejacking<\/a>","0"],[69,"Bluesnarfing<\/a>","0"],[70,"RFID<\/a>","0"],[71,"NFC<\/a>","0"],[72,"Disassociation<\/a>","0"],[73," Cryptographic attacks<\/a>","0"],[74,"Birthday<\/a>","0"],[75,"Known plain text\/cipher text<\/a>","0"],[76,"Rainbow tables<\/a>","0"],[77,"Dictionary<\/a>","0"],[78,"Brute force<\/a>","0"],[79,"Online vs.offline<\/a>","0"],[80,"Collision<\/a>","0"],[81,"Downgrade<\/a>","0"],[82,"Weak implementations<\/a>","0"],[83,"Explain threat actor types and attributes.<\/a>","0"],[84,"Types of actors<\/a>","0"],[85,"Script kiddies<\/a>","0"],[86,"Hacktivist<\/a>","0"],[87,"Organized crime<\/a>","0"],[88,"Nation states\/APT<\/a>","0"],[89,"Insiders<\/a>","0"],[90,"Competitors<\/a>","0"],[91,"Attributes of actors<\/a>","0"],[92,"Internal\/external<\/a>","0"],[93,"Level of sophistication<\/a>","0"],[94,"Resources\/funding<\/a>","0"],[95,"Intent\/motivation<\/a>","0"],[96,"Use of open-source intelligence<\/a>","0"],[97,"Explain penetration testing concepts.<\/a>","0"],[98,"Active reconnaissance<\/a>","0"],[99,"Passive reconnaissance<\/a>","0"],[100,"Pivot<\/a>","0"],[101,"Initial exploitation<\/a>","0"],[102,"Persistence<\/a>","0"],[103,"Escalation of privilege<\/a>","0"],[104,"Black box<\/a>","0"],[105,"White box<\/a>","0"],[106,"Gray box<\/a>","0"],[107,"Pen testing vs. vulnerability scanning<\/a>","0"],[108,"Explain vulnerability scanning concepts.<\/a>","0"],[109,"Passively test security controls<\/a>","0"],[110,"Identify vulnerability<\/a>","0"],[111,"Identify lack of security controls<\/a>","0"],[112,"Identify common misconfigurations<\/a>","0"],[113,"Intrusive vs. non-intrusive<\/a>","0"],[114,"Credentialed vs. non-credentialed<\/a>","0"],[115,"False positive<\/a>","0"],[116,"Explain the impact associated with types of vulnerabilities.<\/a>","0"],[117,"Race conditions<\/a>","0"],[118,"Vulnerabilities due to:<\/a>","0"],[119,"End-of-life systems<\/a>","0"],[120,"Embedded systems<\/a>","0"],[121,"Lack of vendor support<\/a>","0"],[122,"Improper input handling<\/a>","0"],[123,"Improper error handling<\/a>","0"],[124,"Misconfiguration\/weak configuration<\/a>","0"],[125,"Default configuration<\/a>","0"],[126,"Resource exhaustion<\/a>","0"],[127,"Untrained users<\/a>","0"],[128,"Improperly configured accounts<\/a>","0"],[129,"Vulnerable business processes<\/a>","0"],[130,"Weak cipher suites and implementations<\/a>","0"],[131,"Memory\/buffer vulnerability<\/a>","0"],[132,"Memory leak<\/a>","0"],[133,"Integer overflow<\/a>","0"],[134,"Pointer dereference<\/a>","0"],[135,"DLL injection<\/a>","0"],[136,"System sprawl\/undocumented assets<\/a>","0"],[137,"Architecture\/design weaknesses<\/a>","0"],[138,"New threats\/zero day<\/a>","0"],[139,"Improper certificate and key management<\/a>","0"],[140,"Install and configure network components, both hardware- and software-based, to support organizational security<\/a>","0"],[141,"Firewall<\/a>","0"],[142,"ACL<\/a>","0"],[143,"Application-based vs. network-based<\/a>","0"],[144,"Stateful vs. stateless<\/a>","0"],[145,"Implicit deny<\/a>","0"],[146,"VPN concentrator<\/a>","0"],[147,"Remote access vs. site-to-site<\/a>","0"],[148,"IPSec <\/a>","0"],[149,"Tunnel mode<\/a>","0"],[150,"Transport mode<\/a>","0"],[151,"AH<\/a>","0"],[152,"ESP<\/a>","0"],[153,"Split tunnel vs. full tunnel<\/a>","0"],[154,"TLS<\/a>","0"],[155,"Always-on VPN<\/a>","0"],[156,"NIPS\/NIDS <\/a>","0"],[157,"Signature-based<\/a>","0"],[158,"Heuristic\/behavioral<\/a>","0"],[159,"Anomaly<\/a>","0"],[160,"Inline vs. passive<\/a>","0"],[161,"In-band vs. out-of-band<\/a>","0"],[162,"Rules<\/a>","0"],[163,"Analytics<\/a>","0"],[164,"False positive<\/a>","0"],[165,"False negative<\/a>","0"],[166,"Router <\/a>","0"],[167,"ACLs<\/a>","0"],[168,"Antispoofing<\/a>","0"],[169,"Switch <\/a>","0"],[170,"Port security<\/a>","0"],[171,"Layer 2 vs. Layer 3<\/a>","0"],[172,"Loop prevention<\/a>","0"],[173,"Flood guard<\/a>","0"],[174,"Proxy <\/a>","0"],[175,"Forward and reverse proxy<\/a>","0"],[176,"Transparent<\/a>","0"],[177,"Application\/multipurpose<\/a>","0"],[178," Load balancer <\/a>","0"],[179,"Scheduling <\/a>","0"],[180,"Affinity<\/a>","0"],[181,"Round-robin<\/a>","0"],[182,"Active-passive<\/a>","0"],[183,"Active-active<\/a>","0"],[184,"Virtual IPs<\/a>","0"],[185,"Access point<\/a>","0"],[186,"SSID<\/a>","0"],[187,"MAC filtering<\/a>","0"],[188,"Signal strength<\/a>","0"],[189,"Band selection\/width<\/a>","0"],[190,"Antenna types and placement<\/a>","0"],[191,"Fat vs. thin<\/a>","0"],[192,"Controller-based vs. standalone<\/a>","0"],[193,"SIEM<\/a>","0"],[194,"Aggregation<\/a>","0"],[195,"Correlation<\/a>","0"],[196,"Automated alerting and triggers<\/a>","0"],[197,"Time synchronization<\/a>","0"],[198,"Event deduplication<\/a>","0"],[199,"Logs\/WORM<\/a>","0"],[200,"DLP<\/a>","0"],[201,"USB blocking<\/a>","0"],[202,"Cloud-based<\/a>","0"],[203,"Email<\/a>","0"],[204,"NAC<\/a>","0"],[205,"Dissolvable vs. permanent<\/a>","0"],[206,"Host health checks<\/a>","0"],[207,"Agent vs. agentless<\/a>","0"],[208,"Mail gateway<\/a>","0"],[209,"Spam filter<\/a>","0"],[210,"Encryption<\/a>","0"],[211,"Bridge<\/a>","0"],[212,"SSL\/TLS accelerators<\/a>","0"],[213,"SSL decryptors<\/a>","0"],[214,"Media gateway<\/a>","0"],[215,"Hardware security module<\/a>","0"],[216,"Given a scenario, use appropriate software tools to assess the security posture of an organization<\/a>","0"],[217,"Protocol analyzer<\/a>","0"],[218,"Network scanners<\/a>","0"],[219,"Rogue system detection<\/a>","0"],[220,"Network mapping<\/a>","0"],[221,"Wireless scanners\/cracker<\/a>","0"],[222,"Password cracker<\/a>","0"],[223,"Vulnerability scanner<\/a>","0"],[224,"Configuration compliance scanner<\/a>","0"],[225,"Exploitation frameworks<\/a>","0"],[226,"Data sanitization tools<\/a>","0"],[227,"Steganography tools<\/a>","0"],[228,"Honeypot<\/a>","0"],[229,"Backup utilities<\/a>","0"],[230,"Banner grabbing<\/a>","0"],[231,"Passive vs. active<\/a>","0"],[232,"Command line tools<\/a>","0"],[233,"ping<\/a>","0"],[234,"netstat<\/a>","0"],[235,"tracert<\/a>","0"],[236,"nslookup\/dig<\/a>","0"],[237,"arp<\/a>","0"],[238,"ipconfig\/ip\/ifconfig<\/a>","0"],[239,"tcpdump<\/a>","0"],[240,"nmap<\/a>","0"],[241,"netcat<\/a>","0"],[242,"Given a scenario, troubleshoot common security issues<\/a>","0"],[243,"Unencrypted credentials\/clear text<\/a>","0"],[244,"Logs and events anomalies<\/a>","0"],[245,"Permission issues<\/a>","0"],[246,"Access violations<\/a>","0"],[247,"Certificate issues<\/a>","0"],[248,"Data exfiltration<\/a>","0"],[249,"Misconfigured devices<\/a>","0"],[250,"Content filter<\/a>","0"],[251,"Access points<\/a>","0"],[252,"Weak security configurations<\/a>","0"],[253,"Personnel issues<\/a>","0"],[254,"Policy violation<\/a>","0"],[255,"Insider threat<\/a>","0"],[256,"Social engineering<\/a>","0"],[257,"Social media<\/a>","0"],[258,"Personal email<\/a>","0"],[259,"Unauthorized software<\/a>","0"],[260,"Baseline deviation<\/a>","0"],[261,"License compliance violation (availability\/integrity)<\/a>","0"],[262,"Asset management<\/a>","0"],[263,"Authentication issues<\/a>","0"],[264,"Given a scenario, analyze and interpret output from security technologies<\/a>","0"],[265,"HIDS\/HIPS<\/a>","0"],[266,"Antivirus<\/a>","0"],[267,"File integrity check<\/a>","0"],[268,"Host-based firewall<\/a>","0"],[269,"Application whitelisting<\/a>","0"],[270,"Removable media control<\/a>","0"],[271,"Advanced malware tools<\/a>","0"],[272,"Patch management tools<\/a>","0"],[273,"UTM<\/a>","0"],[274,"Data execution prevention<\/a>","0"],[275,"Web application firewall<\/a>","0"],[276,"Given a scenario, deploy mobile devices securely <\/a>","0"],[277,"Connection methods <\/a>","0"],[278,"Cellular<\/a>","0"],[279,"WiFi<\/a>","0"],[280,"SATCOM<\/a>","0"],[281,"Bluetooth<\/a>","0"],[282,"NFC<\/a>","0"],[283,"ANT<\/a>","0"],[284,"Infrared<\/a>","0"],[285,"USB<\/a>","0"],[286,"Mobile device management concepts <\/a>","0"],[287,"Application management<\/a>","0"],[288,"Content management<\/a>","0"],[289,"Remote wipe<\/a>","0"],[290,"Geofencing<\/a>","0"],[291,"Geolocation<\/a>","0"],[292,"Screen locks<\/a>","0"],[293,"Push notification services<\/a>","0"],[294,"Passwords and pins<\/a>","0"],[295,"Biometrics<\/a>","0"],[296,"Context-aware authentication<\/a>","0"],[297,"Containerization<\/a>","0"],[298,"Storage segmentation<\/a>","0"],[299,"Full device encryption<\/a>","0"],[300,"Third-party app stores<\/a>","0"],[301,"Rooting\/jailbreaking<\/a>","0"],[302,"Sideloading<\/a>","0"],[303,"Custom firmware<\/a>","0"],[304,"Carrier unlocking<\/a>","0"],[305,"Firmware OTA updates<\/a>","0"],[306,"Camera use<\/a>","0"],[307,"SMS\/MMS<\/a>","0"],[308,"External media<\/a>","0"],[309,"USB OTG<\/a>","0"],[310,"Recording microphone<\/a>","0"],[311,"GPS tagging<\/a>","0"],[312,"WiFi direct\/ad hoc<\/a>","0"],[313,"Tethering<\/a>","0"],[314,"Payment methods<\/a>","0"],[315,"Deployment models<\/a>","0"],[316,"BYOD<\/a>","0"],[317,"COPE<\/a>","0"],[318,"CYOD<\/a>","0"],[319,"Corporate-owned<\/a>","0"],[320,"VDI<\/a>","0"],[321,"Given a scenario, implement secure protocols<\/a>","0"],[322,"Protocols<\/a>","0"],[323,"DNSSEC<\/a>","0"],[324,"SSH<\/a>","0"],[325,"S\/MIME<\/a>","0"],[326,"SRTP<\/a>","0"],[327,"LDAPS<\/a>","0"],[328,"FTPS<\/a>","0"],[329,"SFTP<\/a>","0"],[330,"SNMPv3<\/a>","0"],[331,"SSL\/TLS<\/a>","0"],[332,"HTTPS<\/a>","0"],[333,"Secure POP\/IMAP<\/a>","0"],[334,"Use cases<\/a>","0"],[335,"Voice and video<\/a>","0"],[336,"Email and web<\/a>","0"],[337,"File transfer<\/a>","0"],[338,"Directory services<\/a>","0"],[339,"Remote access<\/a>","0"],[340,"Domain name resolution<\/a>","0"],[341,"Routing and switching<\/a>","0"],[342,"Network address allocation<\/a>","0"],[343,"Subscription services<\/a>","0"],[344," Architecture and Design <\/a>","0"],[345," Explain use cases and purpose for frameworks, best practices and secure configuration guides<\/a>","0"],[346,"Industry-standard frameworks and reference architectures<\/a>","0"],[347,"Regulatory<\/a>","0"],[348,"Non-regulatory<\/a>","0"],[349,"National vs. international<\/a>","0"],[350,"Industry-specific frameworks<\/a>","0"],[351,"Benchmarks\/secure configuration guides<\/a>","0"],[352,"Platform\/vendor-specific guides<\/a>","0"],[353,"Web server<\/a>","0"],[354,"Operating system<\/a>","0"],[355,"Application server<\/a>","0"],[356,"Network infrastructure devices<\/a>","0"],[357,"General purpose guides<\/a>","0"],[358,"Defense-in-depth\/layered security<\/a>","0"],[359,"Vendor diversity<\/a>","0"],[360,"Control diversity<\/a>","0"],[361,"Administrative<\/a>","0"],[362,"Technical<\/a>","0"],[363,"User training<\/a>","0"],[364,"Given a scenario, implement secure network architecture concepts<\/a>","0"],[365,"Zones\/topologies<\/a>","0"],[366,"DMZ<\/a>","0"],[367,"Extranet<\/a>","0"],[368,"Intranet<\/a>","0"],[369,"Wireless<\/a>","0"],[370,"Guest<\/a>","0"],[371,"Honeynets<\/a>","0"],[372,"NAT<\/a>","0"],[373,"Ad hoc<\/a>","0"],[374,"Segregation\/segmentation\/isolation<\/a>","0"],[375,"Physical<\/a>","0"],[376,"Logical (VLAN)<\/a>","0"],[377,"Virtualization<\/a>","0"],[378,"Air gaps<\/a>","0"],[379,"Tunneling\/VPN<\/a>","0"],[380,"Site-to-site<\/a>","0"],[381,"Remote access<\/a>","0"],[382,"Security device\/technology placement<\/a>","0"],[383,"Sensors<\/a>","0"],[384,"Collectors<\/a>","0"],[385,"Correlation engines<\/a>","0"],[386,"Filters<\/a>","0"],[387,"Proxies<\/a>","0"],[388,"Firewalls<\/a>","0"],[389,"VPN concentrators<\/a>","0"],[390,"SSL accelerators<\/a>","0"],[391,"Load balancers<\/a>","0"],[392,"DDoS mitigator<\/a>","0"],[393,"Aggregation switches<\/a>","0"],[394,"Taps and port mirror<\/a>","0"],[395,"SDN<\/a>","0"],[396,"Given a scenario, implement secure systems design <\/a>","0"],[397,"Hardware\/firmware security<\/a>","0"],[398,"FDE\/SED<\/a>","0"],[399,"TPM<\/a>","0"],[400,"HSM<\/a>","0"],[401,"UEFI\/BIOS<\/a>","0"],[402,"Secure boot and attestation<\/a>","0"],[403,"Supply chain<\/a>","0"],[404,"Hardware root of trust<\/a>","0"],[405,"EMI\/EMP<\/a>","0"],[406,"Operating systems<\/a>","0"],[407,"Types<\/a>","0"],[408,"Network<\/a>","0"],[409,"Server<\/a>","0"],[410,"Workstation<\/a>","0"],[411,"Appliance<\/a>","0"],[412,"Kiosk<\/a>","0"],[413,"Mobile OS<\/a>","0"],[414,"Patch management<\/a>","0"],[415,"Disabling unnecessary ports and services<\/a>","0"],[416,"Least functionality<\/a>","0"],[417,"Secure configurations<\/a>","0"],[418,"Trusted operating system<\/a>","0"],[419,"Application whitelisting\/blacklisting<\/a>","0"],[420,"Disable default accounts\/passwords<\/a>","0"],[421,"Peripherals<\/a>","0"],[422,"Wireless keyboards<\/a>","0"],[423,"Wireless mice<\/a>","0"],[424,"Displays<\/a>","0"],[425,"WiFi-enabled MicroSD cards<\/a>","0"],[426,"Printers\/MFDs<\/a>","0"],[427,"External storage devices<\/a>","0"],[428,"Digital cameras<\/a>","0"],[429,"Explain the importance of secure staging deployment concepts<\/a>","0"],[430,"Sandboxing<\/a>","0"],[431,"Environment<\/a>","0"],[432,"Development<\/a>","0"],[433,"Test<\/a>","0"],[434,"Staging<\/a>","0"],[435,"Production<\/a>","0"],[436,"Secure baseline<\/a>","0"],[437,"Integrity measurement<\/a>","0"],[438,"Explain the security implications of embedded systems <\/a>","0"],[439,"SCADA\/ICS<\/a>","0"],[440,"Smart devices\/IoT<\/a>","0"],[441,"Wearable technology<\/a>","0"],[442,"Home automation<\/a>","0"],[443,"HVAC<\/a>","0"],[444,"SoC<\/a>","0"],[445,"RTOS<\/a>","0"],[446,"Camera systems<\/a>","0"],[447,"Special purpose<\/a>","0"],[448,"Medical devices<\/a>","0"],[449,"Vehicles<\/a>","0"],[450,"Aircraft\/UAV<\/a>","0"],[451,"Summarize secure application development and deployment concepts<\/a>","0"],[452,"Development life-cycle models<\/a>","0"],[453,"Waterfall vs. Agile<\/a>","0"],[454,"Secure DevOps<\/a>","0"],[455,"Security automation<\/a>","0"],[456,"Continuous integration<\/a>","0"],[457,"Baselining<\/a>","0"],[458,"Immutable systems<\/a>","0"],[459,"Infrastructure as code<\/a>","0"],[460,"Version control and change management<\/a>","0"],[461,"Provisioning and deprovisioning<\/a>","0"],[462,"Secure coding techniques<\/a>","0"],[463,"Proper error handling<\/a>","0"],[464,"Proper input validation<\/a>","0"],[465,"Normalization<\/a>","0"],[466,"Stored procedures<\/a>","0"],[467,"Code signing<\/a>","0"],[468,"Encryption<\/a>","0"],[469,"Obfuscation\/camouflage<\/a>","0"],[470,"Code reuse\/dead code<\/a>","0"],[471,"Server-side vs. client-side execution and validation<\/a>","0"],[472,"Memory management<\/a>","0"],[473,"Use of third-party libraries and SDKs<\/a>","0"],[474,"Data exposure<\/a>","0"],[475,"Code quality and testing<\/a>","0"],[476,"Static code analyzers<\/a>","0"],[477,"Dynamic analysis (e.g., fuzzing)<\/a>","0"],[478,"Stress testing<\/a>","0"],[479,"Model verification<\/a>","0"],[480,"Compiled vs. runtime code<\/a>","0"],[481,"Summarize cloud and virtualization concepts<\/a>","0"],[482,"Hypervisor<\/a>","0"],[483,"Type I<\/a>","0"],[484,"Type II<\/a>","0"],[485,"Application cells\/containers<\/a>","0"],[486,"VM sprawl avoidance<\/a>","0"],[487,"VM escape protection<\/a>","0"],[488,"Cloud storage<\/a>","0"],[489,"Cloud deployment models<\/a>","0"],[490,"SaaS<\/a>","0"],[491,"PaaS<\/a>","0"],[492,"IaaS<\/a>","0"],[493,"Private<\/a>","0"],[494,"Public<\/a>","0"],[495,"Hybrid<\/a>","0"],[496,"Community<\/a>","0"],[497,"On-premise vs. hosted vs. cloud<\/a>","0"],[498,"VDI\/VDE<\/a>","0"],[499,"Cloud access security broker<\/a>","0"],[500,"Security as a Service<\/a>","0"],[501,"Explain how resiliency and automation strategies reduce risk<\/a>","0"],[502,"Automation\/scripting<\/a>","0"],[503,"Automated courses of action<\/a>","0"],[504,"Continuous monitoring<\/a>","0"],[505,"Configuration validation<\/a>","0"],[506,"Templates<\/a>","0"],[507,"Master image<\/a>","0"],[508,"Non-persistence<\/a>","0"],[509,"Snapshots<\/a>","0"],[510,"Revert to known state<\/a>","0"],[511,"Rollback to known configuration<\/a>","0"],[512,"Live boot media<\/a>","0"],[513,"Elasticity<\/a>","0"],[514,"Scalability<\/a>","0"],[515,"Distributive allocation<\/a>","0"],[516,"Redundancy<\/a>","0"],[517,"Fault tolerance<\/a>","0"],[518,"High availability<\/a>","0"],[519,"RAID<\/a>","0"],[520,"Explain the importance of physical security controls<\/a>","0"],[521,"Lighting<\/a>","0"],[522,"Signs<\/a>","0"],[523,"Fencing\/gate\/cage<\/a>","0"],[524,"Security guards<\/a>","0"],[525,"Alarms<\/a>","0"],[526,"Safe<\/a>","0"],[527,"Secure cabinets\/enclosures<\/a>","0"],[528,"Protected distribution\/Protected cabling<\/a>","0"],[529,"Airgap<\/a>","0"],[530,"Mantrap<\/a>","0"],[531,"Faraday cage<\/a>","0"],[532,"Lock types<\/a>","0"],[533,"Biometrics<\/a>","0"],[534,"Barricades\/bollards<\/a>","0"],[535,"Tokens\/cards<\/a>","0"],[536,"Environmental controls<\/a>","0"],[537,"Hot and cold aisles<\/a>","0"],[538,"Fire suppression<\/a>","0"],[539,"Cable locks<\/a>","0"],[540,"Screen filters<\/a>","0"],[541,"Cameras<\/a>","0"],[542,"Motion detection<\/a>","0"],[543,"Logs<\/a>","0"],[544,"Infrared detection<\/a>","0"],[545,"Key management<\/a>","0"],[546,"Identity and Access Management<\/a>","0"],[547,"Compare and contrast identity and access management concepts<\/a>","0"],[548,"Identification, authentication, authorization and accounting (AAA)<\/a>","0"],[549,"Multifactor authentication<\/a>","0"],[550,"Something you are<\/a>","0"],[551,"Something you have<\/a>","0"],[552,"Something you know<\/a>","0"],[553,"Somewhere you are<\/a>","0"],[554,"Something you do<\/a>","0"],[555,"Federation<\/a>","0"],[556,"Single sign-on<\/a>","0"],[557,"Transitive trust<\/a>","0"],[558," Given a scenario, install and configure identity and access services<\/a>","0"],[559,"LDAP<\/a>","0"],[560,"Kerberos<\/a>","0"],[561,"TACACS+<\/a>","0"],[562,"CHAP<\/a>","0"],[563,"PAP<\/a>","0"],[564,"MSCHAP<\/a>","0"],[565,"RADIUS<\/a>","0"],[566,"SAML<\/a>","0"],[567,"OpenID Connect<\/a>","0"],[568,"OAUTH<\/a>","0"],[569,"Shibboleth<\/a>","0"],[570,"Secure token<\/a>","0"],[571,"NTLM<\/a>","0"],[572," Given a scenario, implement identity and access management controls<\/a>","0"],[573,"Access control models<\/a>","0"],[574,"MAC<\/a>","0"],[575,"DAC<\/a>","0"],[576,"ABAC<\/a>","0"],[577,"Role-based access control<\/a>","0"],[578,"Rule-based access control<\/a>","0"],[579,"Physical access control<\/a>","0"],[580,"Proximity cards<\/a>","0"],[581,"Smart cards<\/a>","0"],[582,"Biometric factors<\/a>","0"],[583,"Fingerprint scanner<\/a>","0"],[584,"Retinal scanner<\/a>","0"],[585,"Iris scanner<\/a>","0"],[586,"Voice recognition<\/a>","0"],[587,"Facial recognition<\/a>","0"],[588,"False acceptance rate<\/a>","0"],[589,"False rejection rate<\/a>","0"],[590,"Crossover error rate<\/a>","0"],[591,"Tokens<\/a>","0"],[592,"Hardware<\/a>","0"],[593,"Software<\/a>","0"],[594,"HOTP\/TOTP<\/a>","0"],[595,"Certificate-based authentication<\/a>","0"],[596,"PIV\/CAC\/smart card<\/a>","0"],[597,"IEEE 802.1x<\/a>","0"],[598,"File system security<\/a>","0"],[599,"Database security<\/a>","0"],[600," Given a scenario, differentiate common account management practices<\/a>","0"],[601,"Account types<\/a>","0"],[602,"User account<\/a>","0"],[603,"Shared and generic accounts\/credentials<\/a>","0"],[604,"Guest accounts<\/a>","0"],[605,"Service accounts<\/a>","0"],[606,"Privileged accounts<\/a>","0"],[607,"General Concepts<\/a>","0"],[608,"Least privilege<\/a>","0"],[609,"Onboarding\/offboarding<\/a>","0"],[610,"Permission auditing and review<\/a>","0"],[611,"Usage auditing and review<\/a>","0"],[612,"Time-of-day restrictions<\/a>","0"],[613,"Recertification<\/a>","0"],[614,"Standard naming convention<\/a>","0"],[615,"Account maintenance<\/a>","0"],[616,"Group-based access control<\/a>","0"],[617,"Location-based policies<\/a>","0"],[618,"Account policy enforcement<\/a>","0"],[619,"Credential management<\/a>","0"],[620,"Group policy<\/a>","0"],[621,"Password complexity<\/a>","0"],[622,"Expiration<\/a>","0"],[623,"Recovery<\/a>","0"],[624,"Disablement<\/a>","0"],[625,"Lockout<\/a>","0"],[626,"Password history<\/a>","0"],[627,"Password reuse<\/a>","0"],[628,"Password length<\/a>","0"],[629,"Risk Management<\/a>","0"],[630,"Explain the importance of policies, plans and procedures related to organizational security<\/a>","0"],[631,"Standard operating procedure<\/a>","0"],[632,"Agreement types<\/a>","0"],[633,"BPA<\/a>","0"],[634,"SLA<\/a>","0"],[635,"ISA<\/a>","0"],[636,"MOU\/MOA<\/a>","0"],[637,"Personnel management<\/a>","0"],[638,"Mandatory vacations<\/a>","0"],[639,"Job rotation<\/a>","0"],[640,"Separation of duties<\/a>","0"],[641,"Clean desk<\/a>","0"],[642,"Background checks<\/a>","0"],[643,"Exit interviews<\/a>","0"],[644,"Role-based awareness training<\/a>","0"],[645,"Data owner<\/a>","0"],[646,"System administrator<\/a>","0"],[647,"System owner<\/a>","0"],[648,"User<\/a>","0"],[649,"Privileged user<\/a>","0"],[650,"Executive user<\/a>","0"],[651,"NDA<\/a>","0"],[652,"Onboarding<\/a>","0"],[653,"Continuing education<\/a>","0"],[654,"Acceptable use policy\/rules of behavior<\/a>","0"],[655,"Adverse actions<\/a>","0"],[656,"General security policies<\/a>","0"],[657,"Social media networks\/applications<\/a>","0"],[658,"Personal email<\/a>","0"],[659,"Summarize business impact analysis concepts<\/a>","0"],[660,"RTO\/RPO<\/a>","0"],[661,"MTBF<\/a>","0"],[662,"MTTR<\/a>","0"],[663,"Mission-essential functions<\/a>","0"],[664,"Identification of critical systems<\/a>","0"],[665,"Single point of failure<\/a>","0"],[666,"Impact<\/a>","0"],[667,"Life<\/a>","0"],[668,"Property<\/a>","0"],[669,"Safety<\/a>","0"],[670,"Finance<\/a>","0"],[671,"Reputation<\/a>","0"],[672,"Privacy impact assessment<\/a>","0"],[673,"Privacy threshold assessment<\/a>","0"],[674,"Explain risk management processes and concepts<\/a>","0"],[675,"Threat assessment<\/a>","0"],[676,"Environmental<\/a>","0"],[677,"Manmade<\/a>","0"],[678,"Internal vs. external<\/a>","0"],[679,"Risk assessment<\/a>","0"],[680,"SLE<\/a>","0"],[681,"ALE<\/a>","0"],[682,"ARO<\/a>","0"],[683,"Asset value<\/a>","0"],[684,"Risk register<\/a>","0"],[685,"Likelihood of occurrence<\/a>","0"],[686,"Supply chain assessment<\/a>","0"],[687,"Quantitative<\/a>","0"],[688,"Qualitative<\/a>","0"],[689,"Testing<\/a>","0"],[690,"Penetration testing authorization<\/a>","0"],[691,"Vulnerability testing authorization<\/a>","0"],[692,"Risk response techniques<\/a>","0"],[693,"Accept<\/a>","0"],[694,"Transfer<\/a>","0"],[695,"Avoid<\/a>","0"],[696,"Mitigate<\/a>","0"],[697,"Change management<\/a>","0"],[698," Given a scenario, follow incident response procedures<\/a>","0"],[699,"Incident response plan<\/a>","0"],[700,"Documented incident types\/category definitions<\/a>","0"],[701,"Roles and responsibilities<\/a>","0"],[702,"Reporting requirements\/escalation<\/a>","0"],[703,"Cyber-incident response teams<\/a>","0"],[704,"Exercise<\/a>","0"],[705,"Incident response process<\/a>","0"],[706,"Preparation<\/a>","0"],[707,"Identification<\/a>","0"],[708,"Containment<\/a>","0"],[709,"Eradication<\/a>","0"],[710,"Recovery<\/a>","0"],[711,"Lessons learned<\/a>","0"],[712,"Summarize basic concepts of forensics<\/a>","0"],[713,"Order of volatility<\/a>","0"],[714,"Chain of custody<\/a>","0"],[715,"Legal hold<\/a>","0"],[716,"Data acquisition<\/a>","0"],[717,"Capture system image<\/a>","0"],[718,"Network traffic and logs<\/a>","0"],[719,"Capture video<\/a>","0"],[720,"Record time offset<\/a>","0"],[721,"Take hashes<\/a>","0"],[722,"Screenshots<\/a>","0"],[723,"Witness interviews<\/a>","0"],[724,"Preservation<\/a>","0"],[725,"Strategic intelligence\/counterintelligence gathering<\/a>","0"],[726,"Active logging<\/a>","0"],[727,"Track man-hours<\/a>","0"],[728,"Explain disaster recovery and continuity of operation concepts<\/a>","0"],[729,"Recovery sites<\/a>","0"],[730,"Hot site<\/a>","0"],[731,"Warm site<\/a>","0"],[732,"Cold site<\/a>","0"],[733,"Order of restoration<\/a>","0"],[734,"Backup concepts<\/a>","0"],[735,"Differential<\/a>","0"],[736,"Incremental<\/a>","0"],[737,"Snapshots<\/a>","0"],[738,"Full<\/a>","0"],[739,"Geographic considerations<\/a>","0"],[740,"Off-site backups<\/a>","0"],[741,"Distance<\/a>","0"],[742,"Location selection<\/a>","0"],[743,"Legal implications<\/a>","0"],[744,"Data sovereignty<\/a>","0"],[745,"Continuity of operation planning<\/a>","0"],[746,"Exercises\/tabletop<\/a>","0"],[747,"After-action reports<\/a>","0"],[748,"Failover<\/a>","0"],[749,"Alternate processing sites<\/a>","0"],[750,"Alternate business practices<\/a>","0"],[751," Compare and contrast various types of controls<\/a>","0"],[752,"Deterrent<\/a>","0"],[753,"Preventive<\/a>","0"],[754,"Detective<\/a>","0"],[755,"Corrective<\/a>","0"],[756,"Compensating<\/a>","0"],[757,"Technical<\/a>","0"],[758,"Administrative<\/a>","0"],[759,"Physical<\/a>","0"],[760,"Given a scenario, carry out data security and privacy practices<\/a>","0"],[761,"Data destruction and media sanitization<\/a>","0"],[762,"Burning<\/a>","0"],[763,"Shredding<\/a>","0"],[764,"Pulping<\/a>","0"],[765,"Pulverizing<\/a>","0"],[766,"Degaussing<\/a>","0"],[767,"Purging<\/a>","0"],[768,"Wiping<\/a>","0"],[769,"Data sensitivity labeling and handling<\/a>","0"],[770,"Confidential<\/a>","0"],[771,"Private<\/a>","0"],[772,"Public<\/a>","0"],[773,"Proprietary<\/a>","0"],[774,"PII<\/a>","0"],[775,"PHI<\/a>","0"],[776,"Data roles<\/a>","0"],[777,"Owner<\/a>","0"],[778,"Steward\/custodian<\/a>","0"],[779,"Privacy officer<\/a>","0"],[780,"Data retention<\/a>","0"],[781,"Legal and compliance<\/a>","0"],[782,"Symmetric algorithms<\/a>","1"],[783," Cryptography and PKI <\/a>","0"],[784," Compare and contrast basic concepts of cryptography<\/a>","0"],[785,"Modes of operation<\/a>","0"],[786,"Asymmetric algorithms<\/a>","0"],[787,"Hashing<\/a>","0"],[788,"Salt, IV, nonce<\/a>","0"],[789,"Elliptic curve<\/a>","0"],[790,"Weak\/deprecated algorithms<\/a>","0"],[791,"Key exchange<\/a>","0"],[792,"Digital signatures<\/a>","0"],[793,"Diffusion<\/a>","0"],[794,"Confusion<\/a>","0"],[795,"Collision<\/a>","0"],[796,"Steganography<\/a>","0"],[797,"Obfuscation<\/a>","0"],[798,"Stream vs. block<\/a>","0"],[799,"Key strength<\/a>","0"],[800,"Session keys<\/a>","0"],[801,"Ephemeral key<\/a>","0"],[802,"Secret algorithm<\/a>","0"],[803,"Data-in-transit<\/a>","0"],[804,"Data-at-rest<\/a>","0"],[805,"Data-in-use<\/a>","0"],[806,"Random\/pseudo-random number generation<\/a>","0"],[807,"Key stretching<\/a>","0"],[808,"Implementation vs. algorithm selection<\/a>","0"],[809,"Crypto service provider<\/a>","0"],[810,"Crypto modules<\/a>","0"],[811,"Perfect forward secrecy<\/a>","0"],[812,"Security through obscurity<\/a>","0"],[813,"Common use cases<\/a>","0"],[814,"Low power devices<\/a>","0"],[815,"Low latency<\/a>","0"],[816,"High resiliency<\/a>","0"],[817,"Supporting confidentiality<\/a>","0"],[818,"Supporting integrity<\/a>","0"],[819,"Supporting obfuscation<\/a>","0"],[820,"Supporting authentication<\/a>","0"],[821,"Supporting non-repudiation<\/a>","0"],[822,"Resource vs. security constraints<\/a>","0"],[823," Explain cryptography algorithms and their basic characteristics<\/a>","1"],[824,"AES<\/a>","0"],[825,"DES<\/a>","0"],[826,"3DES<\/a>","0"],[827,"RC4<\/a>","0"],[828,"Blowfish\/Twofish<\/a>","0"],[829,"Cipher modes<\/a>","0"],[830,"CBC<\/a>","0"],[831,"GCM<\/a>","0"],[832,"ECB<\/a>","0"],[833,"CTM<\/a>","0"],[834,"RSA<\/a>","0"],[835,"DSA<\/a>","0"],[836,"Diffie-Hellman<\/a>","0"],[837,"Groups<\/a>","0"],[838,"DHE<\/a>","0"],[839,"ECDHE<\/a>","0"],[840,"PGP\/GPG<\/a>","0"],[841,"Hashing algorithms<\/a>","0"],[842,"MD5<\/a>","0"],[843,"SHA<\/a>","0"],[844,"HMAC<\/a>","0"],[845,"RIPEMD<\/a>","0"],[846,"Key stretching algorithms<\/a>","0"],[847,"BCRYPT<\/a>","0"],[848,"PBKDF2<\/a>","0"],[849,"XOR<\/a>","0"],[850,"ROT13<\/a>","0"],[851,"Substitution ciphers<\/a>","0"],[852,"Given a scenario, install and configure wireless security settings<\/a>","2"],[853,"Cryptographic protocols<\/a>","0"],[854,"WPA<\/a>","0"],[855,"WPA2<\/a>","0"],[856,"CCMP<\/a>","0"],[857,"TKIP<\/a>","0"],[858,"Authentication protocols<\/a>","0"],[859,"EAP<\/a>","0"],[860,"PEAP<\/a>","0"],[861,"EAP-FAST<\/a>","0"],[862,"EAP-TLS<\/a>","0"],[863,"EAP-TTLS<\/a>","0"],[864,"IEEE 802.1x<\/a>","0"],[865,"RADIUS Federation<\/a>","0"],[866,"Methods<\/a>","0"],[867,"PSK vs. Enterprise vs. Open<\/a>","0"],[868,"WPS<\/a>","0"],[869,"Captive portals<\/a>","0"],[870," Given a scenario, implement public key infrastructure<\/a>","0"],[871,"Components<\/a>","0"],[872,"CA<\/a>","0"],[873,"Intermediate CA<\/a>","0"],[874,"CRL<\/a>","0"],[875,"OCSP<\/a>","0"],[876,"CSR<\/a>","0"],[877,"Certificate<\/a>","0"],[878,"Public key<\/a>","0"],[879,"Private key<\/a>","0"],[880,"Object identifiers (OID)<\/a>","0"],[881,"Concepts<\/a>","0"],[882,"Online vs. offline CA<\/a>","0"],[883,"Stapling<\/a>","0"],[884,"Pinning<\/a>","0"],[885,"Trust model<\/a>","0"],[886,"Key escrow<\/a>","0"],[887,"Certificate chaining<\/a>","0"],[888,"Types of certificates<\/a>","0"],[889,"Wildcard<\/a>","0"],[890,"SAN<\/a>","0"],[891,"Code signing<\/a>","0"],[892,"Self-signed<\/a>","0"],[893,"Machine\/computer<\/a>","0"],[894,"Email<\/a>","0"],[895,"User<\/a>","0"],[896,"Root<\/a>","0"],[897,"Domain validation<\/a>","0"],[898,"Extended validation<\/a>","0"],[899,"Certificate formats<\/a>","0"],[900,"DER <\/a>","0"],[901,"PEM<\/a>","0"],[902,"PFX<\/a>","0"],[903,"CER<\/a>","0"],[904,"P12<\/a>","0"],[905,"P7B<\/a>","0"]],"sEcho":"","iTotalRecords":905,"iTotalDisplayRecords":905}