This thread contains any errata concerning incorrect or incomplete information in the Security+ Cert Guide 1st Edition. It also has some additions to the text. If you find anything in the book that you believe is incorrect, please Contact Me.
Page 35. The two bullets at the bottom of the page (False positive and False negative) refer to IPS. This should be IDS. Also, the first sentence of the second bullet should be replaced with: "If the IDS identifies an attack as legitimate activity it would be known as a false negative. For example: if the IDS does not have a particular attack's signature in its database, the IDS will most likely not detect the attack, believing it to be legitimate, and the attack will run its course without any IDS warnings."
Page 100. Typo: 1st three words "should be voided" should read as "should be avoided".
Page 124. Lines 11 and 12: The addresses of the DMZ and LAN connections are reversed. Figure 5-2 is correct. So the text should read: "... DMZ connection (192.168.100.200) and an even more secure fashion on the LAN connection (172.29.250.200)."
Page 134. Table 5-4, Port 143 IMAP. The text says "Internet Access Message Protocol" but should read "Internet Message Access Protocol".
Page 144. 2nd paragraph, third sentence should be replaced with: "This is the predecessor to DNS, and although the file is normally empty of entries, it is still read and parsed by Windows operating systems."
Page 181. Question 14. Answer D: "URLs certificates were goals" should be simply "URLs". "URLs" is a correct answer, and the answer/explanation is correct.
Page 196. SSID Broadcast heading. It wasn't mentioned,
but clients can still connect to a wireless network that is not broadcasting
the SSID. This can be done manually within the wireless adapter settings
(or by first accessing Windows Zero Configuration). However, the preson
connecting must know the SSID, the type of encryption being used, and
the encryption key. Some third-party wireless software applications
won't allow for this to be manually entered. If that is the case, the
software should be disabled and the client should connect using the
Windows Zero Configuration software.
Page 199. Typo: The first line has an unexpected and superfluous J.
Page 246. In case there is any confusion, the answer to question 16 is A, False rejection. Here is the modified explanation: Answer: A. If a biometric system identifies a legitimate user as unauthorized, it is known as a false rejection, or a false negative (in this case false rejection is the best answer as it deals specifically with biometric systems). A false positive is when a system authenticates a user who should not be allowed access. False exceptions have to do with software that has failed and needs to be debugged.
Page 345. Explanation 14. In the second sentence, the word "Blocking" should be "Logging".
Page 416. 2nd bullet (Warm Site) last sentence. "less inexpensive" should be "less expensive".
Page 427. Question 1. "Downtime" might not be the best word here, and in the explanation on page 430. Reason being, RAID 5 and 4 won't necessarily have any downtime per se. But there will be degraded performance until a new drive is swapped in. Sometimes I refer to this as "downtime", but technically it is not.
Page 431, Explanation 4, and page 432, Explanation 15. The explanations for both of these questions say that differential backups will backup all data since the last differential or full backup. This is incorrect. Differential backups only backup the data that has changed since the last full backup, not since a differential. The text in the chapter regarding differential backups is correct, And, the answers and explanations for these two questions are otherwise correct.
|About Dave||Testimonials||FAQ||Site Map||Contact|
Copyright © David L. Prowse – Official Website - All Rights Reserved