(c)We Want to Hear from You



CompTIA Security+ SYO-401 Exam Cram

Fourth Edition

Copyright © 2015 Pearson Education, Inc.

ISBN-10: 0-7897-5334-0

ISBN-13: 978-0-7897-5334-2

Warning and Disclaimer

Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an "as is" basis. The author and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the CD or programs accompanying it.

When reviewing corrections, always check the print number of your book. Corrections are made to printed books with each subsequent printing.

First Printing: February 2015

Corrections for January 16, 2017

|Pg |Error – Fourth Printing |Correction |

|512 |Answers at a Glance, Answer to Question 78 |Should read: |

| |Reads: | |

| |78. C |78. B |

|528 |Answers with Explanations, Explanation to Answer to Question 78 |Should read: |

| |Reads: | |

| |Answer C is correct. A false negative result involves access refusal for an |Answer B is correct. A false negative result involves falsely allowing unauthorized access. Answer C |

| |authorized user, which makes answer D incorrect. Answers A and B are incorrect |is incorrect as it refuses authorized access, thus being a false positive. Answers A and D are |

| |because they represent granted resource access.  |incorrect because these function as intended and neither represent false events.  |

Corrections for September 9, 2015

|Pg |Error – Second Printing |Correction |

|20 |Chapter 1, Rule-Based Management, Last Two Sentences |Should read: |

| |Read: | |

| |IN addition to firewalls and routers, ACLs are used in operating is based on |In addition to firewalls and routers, ACLs are used in operating systems. |

| |ACLs. The basis of this type osysetms. | |

|32 |Chapter 1, Before Subnetting, insert Table 1.1 |Table 1.1 |

| | |TABLE 1.1 Commonly Used Ports on Severs in the DMZ |

| | |Port |

| | |Service |

| | | |

| | |21 |

| | |FTP |

| | | |

| | |22 |

| | |SSH |

| | | |

| | |25 |

| | |SMTP |

| | | |

| | |53 |

| | |DNS |

| | | |

| | |80 |

| | |HTTP |

| | | |

| | |110 |

| | |POP3 |

| | | |

| | |443 |

| | |HTTPS |

| | | |

This errata sheet is intended to provide updated technical information. Spelling and grammar misprints are updated during the reprint process, but are not listed on this errata sheet.

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download