15.01.2024 Views

CompTIA A+ Certification All-in-One Exam Guide

  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

plenty of open source programs with commercial licensing fees, like server

versions of Linux. Many “free” programs are likewise closed source.

The key for a tech is to know the specific licenses paid for by her

company and ensure that the company abides by those licenses. Using pirated

software or exceeding the use limits set by a EULA, or using private-license

programs in a commercial enterprise, is theft, no matter how easy it is to do in

practice.

Incident Response

Organizations need policies and procedures in place to deal with negative

events that affect their networks and systems—an incidence response. The

larger the organization, the more detailed the incidence response, both from

the team involved to the planning and steps in every contingency. This is a

gigantic topic that we devote a lot of time to in more advanced certifications,

such as CompTIA Security+. From a CompTIA A+ tech’s standpoint, you

need to understand your role and what you should (and definitely should not)

do when an incident happens. This section explores the first response actions,

identifying and reporting the incident, and chain-of-custody issues.

First Response

If you’re part of the incident response team, your first response duties will be

spelled out in detail in the incident response plan. Most likely, your team’s

first action when something bad happens is to secure the area. Then,

determine the scope of the incident (single system, whole group of users, and

so on) and explore the seriousness and impact on the company.

Securing the area can mean physical lockdown (no one in or out) or other

lockdown (no network traffic in or out of the affected section). Determining

the scope of the incident can be accomplished by questioning users,

reviewing log files, and so on. Your network and security people will handle

the possible impact scenarios the organization will face.

Identify and Report

You need to identify clearly and report any security issues so a network

administrator or technician can take steps resolve them. You can set up

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!