ࡱ> molO 9bjbj88 DNRWiRWiX--::::::::8:\R;:M;;(;;;2=2=2=?MAMAMAMAMAMAM@RTDAM:2=2=2=2=2=AM::;;4VM>>>2=R:;:;?M>2=?M>>VF@YG;Ժ2=2=2=2=2=AMAMj>2=2=2=M2=2=2=2=:V2=2=2=2=2=2=2=2=2=-X p9: CompTIA Security+ SY0-601 Cert Guide, 5th Edition Fifth Edition Copyright 2022 Pearson IT Certification ISBN-10: 0-13-677031-2 ISBN-13: 978-0-13-677031-2 Warning and Disclaimer Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an "as is" basis. The author and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the CD or programs accompanying it. When reviewing corrections, always check the print number of your book. Corrections are made to printed books with each subsequent printing. First Printing: October 2021 Corrections for January 23, 2024 PgError First PrintingCorrection396Key Length, third paragraph last line reads: Obviously, 128-bit RC4 encryption is 3 1026 times stronger than 40-bit RC4 encryption.Should read: Obviously, 128-bit RC4 encryption is 3 x 10^26 times stronger than 40-bit RC4 encryption. Corrections for January 16, 2023 PgError First PrintingCorrection312Chapter 13, Question 3 reads: 3. Which hard disk resilience mechanism uses two hard disks to provide redundancy and copies everything to both hard disks? Should read: 3. Which hard disk resilience mechanism uses two hard disks to provide redundancy and stripes everything to both hard disks?  Corrections for November 11, 2022 PgError First PrintingCorrection757Chapter 27, Do I Know This Already, question 6 reads: 6. What Diamond Model places the basic components of malicious activity at one of the four points on a diamond shape? What are the four points? (Choose two.) a. Malware and infection vectors b. Personas and biometrics c. Adversary and infrastructure d. Capability and victimShould read: 6. The Diamond Model places the basic components of malicious activity at one of the four points on a diamond shape. What are the four points?(Choose two) a. Malware and infection vectors b. Personas and biometrics c. Adversary and infrastructure d. Capability and victim Corrections for October 3, 2022 PgError First PrintingCorrection1023Chapter 1, Do I Know This Already, question 6 reads: 6. B. Pharming is a social engineering technique where an attacker incorporates malicious ads on trusted websites, which results in users browsers being inadvertently redirected to sites hosting malware.Should read: 6. A. Malvertising is a social engineering technique where an attacker incorporates malicious ads on trusted websites, which results in users browsers being inadvertently redirected to sites hosting malware. Corrections for Sept 26, 2022 PgError First PrintingCorrection1047Chapter 16, Answer 2. reads 2. D. Cryptographic hash functions have many information-security applications, notably in digital signatures, message authentication codes (MACs), and other forms of authentication.Should read: 2. B. Cryptographic hash functions have many information-security applications, notably in digital signatures, message authentication codes (MACs), and other forms of authentication.  Corrections for April 18, 2022 PgError First PrintingCorrection337Chapter 14, question no. 7 reads 7. Todays surveillance systems are cable of using technology to perform all of the tasks listed here except for which of the following? Should read: 7. Todays surveillance systems are capable of using technology to perform all of the tasks listed here except for which of the following?  This errata sheet is intended to provide updated technical information. Spelling and grammar misprints are updated during the reprint process but are not listed on this errata sheet.     MACGLOBL.DOT  DATE \l 2/28/2024 TIME 5:09 PM Updated Jan 23, 2024 1278?@AOPQRTU]jkrt̼xkxxxx^Qk556huphYyB*OJQJ^JaJfHphq huph1 OJQJaJhuph !OJQJaJhuphhN5OJQJaJhuphYyOJQJaJhuphtEOJQJaJhuph`'OJQJaJhuphcOJQJaJhuphB5OJQJ\aJhuphB5OJQJ^JaJhuphY35OJQJ^JaJhuphYy5OJQJ^JaJ%huphYyB*CJOJQJaJph2@AkW  " % < G  p@@$Ifl  p@@gdRH $ p@@a$gd%o$a$n$a$n$a$gd !gdc$a$gd|$x-DM a$gdYy  W   " $ % + , 3 7 ; < = ٽ󰰰rrrrrrrrrrrh q56OJQJaJh`OJQJaJhuphYyOJQJaJhuph`'OJQJaJhuphySOJQJaJhuphhN5OJQJaJ6huphYyB*OJQJ^JaJfHphq huph%I[OJQJaJhuph1 OJQJaJhuph0OJQJaJ,= F G H K L P V \ x y 6 7 8 9 : ; < = > M N R V X \ ] ^ _ a b y ̼zh=hRHOJQJaJh=h=OJQJaJhQ4hRHOJQJaJh=hRH5OJQJaJhRH56OJQJaJhQ4hRH56OJQJaJhEd56OJQJaJhEd6OJQJ\aJh q6OJQJ\aJh q56OJQJaJ(G H L y 9 cNNNNN p@@$Ifl kd$$IflF8 3 t06    44 lap9 : ; < = > _ cYYYLY $ p@@a$gdEd  p@@gdRHkd$$IflF8 3 t06    44 lap_ b y SB :$If]:gdRHkdX$$IflF2r0 3    4 layt_V $ $Ifa$gd_V $ :$If]:a$gd_V  % & ' 2 4 5 6 9 = 䜜ccVLh:~OJQJaJhQ4hRHOJQJaJ9 *h=h=B*OJQJ^JaJfHph$$$q h=OJPJQJ^JaJhRHOJPJQJ^JaJ h=h=OJPJQJ^JaJ& *h=h=0J|CJOJQJaJo(#h=h=0J|CJOJQJaJo( h=h=0J{CJOJQJaJ6h=h=B*OJQJ^JaJfHph$$$q  & ' 5 6 Skd$$Ifl[F2r0 3    4 layt_Vd$7$8$H$Ifgd=d$7$8$H$Ifgd_V  $ $Ifa$gd.- $ :$If]:a$gd.-  p@@gd:~ $ p@@a$gd% ():<=>Asa#h:~h:~0J|CJOJQJaJo( h:~h:~0J{CJOJQJaJ h:~h:~OJPJQJ^JaJhlh:~CJOJQJaJh:~CJOJPJQJ^JaJhQ4h:~OJQJaJhQ4h:~5OJQJaJh:~56OJQJaJhQ4h:~56OJQJaJh:~OJQJaJhRHOJQJaJ!=>Q_`wcRRRER $Ifgd.-d$7$8$H$Ifgd.- $ :$If]:a$gd.-kd$$IflF2r0 3    4 layt.-78;=PQ_`c!89<=XY\qrsڸ~~~ڸqhQ4h:~OJQJaJ6h:~h:~B*OJQJ^JaJfHph$$$q h:~h:~OJPJQJ^JaJh:~h:~OJQJaJ h:~h:~OJPJQJ^JaJ h:~h:~0J{CJOJQJaJ#h:~h:~0J|CJOJQJaJo(%h:~h:~B*OJPJQJaJph$ !*`rstudWWM  p@@gdl $ p@@a$gd%kd$$Ifl[F2r0 3    4 layt.-d$7$8$H$Ifgd.-stu=FGsoo\\\\\\\$hlhlCJOJPJQJ^JaJhlCJOJPJQJ^JaJ$hlhlCJOJPJQJ^JaJhlhlCJOJQJaJ$hlhlCJOJPJQJ^JaJhQ4hlOJQJaJhQ4hl5OJQJaJhl56OJQJaJhQ4hl56OJQJaJhlOJQJaJh:~OJQJaJ$SBBd$7$8$H$Ifgdlkd$$IflF2r0 3    4 layt$ $ $Ifa$gd$ $ :$If]:a$gd$s&'=`ajksλ틁wgggggggggghQ4hQ456OJQJaJhQ4OJQJaJhlOJQJaJhQ4hlOJQJaJ$hzhzCJOJPJQJ^JaJhzCJOJPJQJ^JaJ$hlhlCJOJPJQJ^JaJhlCJOJPJQJ^JaJhlhlCJOJQJaJ$hlhlCJOJPJQJ^JaJ(WJJJ $ p@@a$gd%kdN$$Ifl[F2r0 3    4 layt$ $Ifgd$d$7$8$H$Ifgdl?kd$$IflF2r0 3    4 laytk"u $ $Ifa$gdk"u $ :$If]:a$gdk"u  p@@gdQ4  p-@gdl =`as%&=st°°䕕xxxxxhuphx56OJQJaJhx56OJQJaJhQ4OJQJaJ hQ4hQ4OJPJQJ^JaJ# *hQ4hQ4OJPJQJ^JaJ hQ4hQ4OJPJQJ^JaJ hQ4hQ4OJPJQJ^JaJhQ4hQ4OJQJaJhQ4hQ45OJQJaJ/WJ $ p@@a$gd%kd~$$Ifl[F2r0 3    4 laytk"u $Ifgdk"ud$7$8$H$IfgdQ4 $ $Ifa$gd` $ :$If]:a$gd`  p@@gdx $ p@@a$gd%#(=Ss"#$%ijij&huphx5OJPJQJ\^JaJ) *huphx5OJPJQJ\^JaJ huphxOJPJQJ^JaJ huphxOJPJQJ^J aJhuphxOJQJaJhuphx5OJQJaJhuphx56OJQJaJ2SwcVVEVVd$7$8$H$Ifgd` $Ifgd` $ :$If]:a$gd`kd$$IflF2r0 3    4 layt`#$%&'WJH $ p@@a$gd%kd$$Ifl[F2r0 3    4 layt`d$7$8$H$Ifgd` $Ifgd`%&'()=s !()56789ļļļģhThEd5CJOJQJaJhu5CJOJQJaJh-h-5CJOJQJaJh qmHnHujhC^KUhC^KhsjhsUhuphhN5OJQJaJ hQ4hQ4hQ4hhN5OJQJaJhQ4OJQJaJ1') !6789v$a$gd- $a$gdy +.gdQ4B0@P0:p-= /!"#$%: Dp$$If!vh#v#v#v:V l t06555p$$If!vh#v#v#v:V l t06555p$$If!vh#v#vr#v:V l0 355r54yt_V$$If!vh#v#vr#v:V l[0 355r54yt_V$$If!vh#v#vr#v:V l0 355r54yt.-$$If!vh#v#vr#v:V l[0 355r54yt.-$$If!vh#v#vr#v:V l0 355r54yt$$$If!vh#v#vr#v:V l[0 355r54yt$$$If!vh#v#vr#v:V l0 355r54ytk"u$$If!vh#v#vr#v:V l[0 355r54ytk"u$$If!vh#v#vr#v:V l0 355r54yt`$$If!vh#v#vr#v:V l[0 355r54yt`~x2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@66666 OJPJQJ_HmH nH sH tH N`N Normald CJOJ PJQJ _HmH sH tH Z@Z Rw Heading 1$<@&5CJ KH OJQJ\^JaJ BB  Heading 4$<@&56DA D Default Paragraph FontVi@V  Table Normal :V 44 la (k (No List J/J FT d CJOJ PJQJ _HmH sH tH / QQTd$d%d&d'dNOPQ#5CJOJ PJQJ _HmH sH tH N/N HC d#5CJOJ PJQJ _HmH sH tH 0U !0 Hyperlink>*B*@V 1@ FollowedHyperlink>*B* R/BR ITd` CJOJ PJQJ _HmH sH tH f/Rf BL'  d^` CJOJ PJQJ _HmH sH tH f/bf BX'  d^` CJOJ PJQJ _HmH sH tH f/rf NL'  d^` CJOJ PJQJ _HmH sH tH f/f NX'  d^` CJOJ PJQJ _HmH sH tH ^/^ UC d^#6CJOJ PJQJ _HmH sH tH Z/Z UL d^ CJOJ PJQJ _HmH sH tH Z/Z UX d^ CJOJ PJQJ _HmH sH tH N/N TN d#5CJOJ PJQJ _HmH sH tH NoN TH d#6CJOJ PJQJ _HmH sH tH T/T TS$da$#6CJOJ PJQJ _HmH sH tH V/V TC @d#5CJOJ PJQJ _HmH sH tH RoR TB @dx CJOJ PJQJ _HmH sH tH R/R TX! @d CJOJ PJQJ _HmH sH tH N/"N LH "d#6CJOJ PJQJ _HmH sH tH V/2V C1#d]#>*CJOJ PJQJ _HmH sH tH R/BR C2$d]#>*CJOJ PJQJ _HmH sH tH V/RV CX%d]#>*CJOJ PJQJ _HmH sH tH Z/bZ MN&d]^ CJOJ PJQJ _HmH sH tH d/rd SH"'$``d]`^`a$#6CJOJ PJQJ _HmH sH tH Z/Z SB(``d]`^` CJOJ PJQJ _HmH sH tH Z/Z NO)``d]`^` CJOJ PJQJ _HmH sH tH Z/Z TI*``d]`^` CJOJ PJQJ _HmH sH tH Z/Z CA+``d]`^` CJOJ PJQJ _HmH sH tH ^/^ EH,$d^a$&56CJOJ PJQJ _HmH sH tH Z/Z ET- d^ CJOJ PJQJ _HmH sH tH Z/Z EX. d^ CJOJ PJQJ _HmH sH tH N/N FC /d#6CJOJ PJQJ _HmH sH tH N/N FN 0d#5CJOJ PJQJ _HmH sH tH L/L M01 1d CJOJ PJQJ _HmH sH tH L/"L M02 2d CJOJ PJQJ _HmH sH tH L/2L M03 3d CJOJ PJQJ _HmH sH tH L/BL M04 4d CJOJ PJQJ _HmH sH tH L/RL M05 5d CJOJ PJQJ _HmH sH tH L/bL M06 6d CJOJ PJQJ _HmH sH tH L/rL M07 7d CJOJ PJQJ _HmH sH tH T/T PD8d&56CJOJ PJQJ _HmH sH tH j/j ENL*9 @@@d^` CJOJ PJQJ _HmH sH tH j/j ENX*: @@@d^` CJOJ PJQJ _HmH sH tH N/N HA ;d#5CJOJ PJQJ _HmH sH tH N/N HB <d#5CJOJ PJQJ _HmH sH tH N/N HD =d#5CJOJ PJQJ _HmH sH tH N/N HE >d#5CJOJ PJQJ _HmH sH tH N/N HF ?d#5CJOJ PJQJ _HmH sH tH N/N HG @d#5CJOJ PJQJ _HmH sH tH h/h EL*A @@@d^` CJOJ PJQJ _HmH sH tH `/"` LC1Bd]^#>*CJOJ PJQJ _HmH sH tH \/2\ LC2Cd]^#>*CJOJ PJQJ _HmH sH tH `/B` LCXDd]^#>*CJOJ PJQJ _HmH sH tH R/RR TRE @dx CJOJ PJQJ _HmH sH tH N/bN AU Fd#6CJOJ PJQJ _HmH sH tH d/rd MH"G$d]^a$#6CJOJ PJQJ _HmH sH tH L/L M08 Hd CJOJ PJQJ _HmH sH tH \/\ CLTI``d]`^` CJOJ PJQJ _HmH sH tH `/` FTNJ``d]`^`#6CJOJ PJQJ _HmH sH tH P/P BTSUB Kd CJOJ PJQJ _HmH sH tH V/V LXLd]#>*CJOJ PJQJ _HmH sH tH \/\ NOXM``d]`^` CJOJ PJQJ _HmH sH tH \/\ TIXN``d]`^` CJOJ PJQJ _HmH sH tH \/\ CAXO``d]`^` CJOJ PJQJ _HmH sH tH \/\ SBXP``d]`^` CJOJ PJQJ _HmH sH tH N/N BT Qd#5CJOJ PJQJ _HmH sH tH L/"L M09 Rd CJOJ PJQJ _HmH sH tH L/2L M10 Sd CJOJ PJQJ _HmH sH tH L/BL M11 Td CJOJ PJQJ _HmH sH tH L/RL M12 Ud CJOJ PJQJ _HmH sH tH L/bL M13 Vd CJOJ PJQJ _HmH sH tH L/rL M14 Wd CJOJ PJQJ _HmH sH tH L/L M15 Xd CJOJ PJQJ _HmH sH tH f/f CSH"Y$d]^a$#6CJOJ PJQJ _HmH sH tH X/X CHDZ@d^@#5CJOJ PJQJ _HmH sH tH X/X CHE[@d^@#5CJOJ PJQJ _HmH sH tH T/T CFT\@d^@ CJOJ PJQJ _HmH sH tH h/h CBL'] `0p`d^p`` CJOJ PJQJ _HmH sH tH h/h CBX'^ `0p`d^p`` CJOJ PJQJ _HmH sH tH h/h CNL'_ `0p`d^p`` CJOJ PJQJ _HmH sH tH h/h CNX'` `0p`d^p`` CJOJ PJQJ _HmH sH tH X/X CTHa@d^@#5CJOJ PJQJ _HmH sH tH `/"` CTCb @d^@#5CJOJ PJQJ _HmH sH tH \/2\ CTBc @d^@ CJOJ PJQJ _HmH sH tH \/B\ CTXd @d^@ CJOJ PJQJ _HmH sH tH N/RN EDTN ed CJOJ PJQJ _HmH sH tH L/bL ADD fd CJOJ PJQJ _HmH sH tH P/rP PTTOC gd CJOJ PJQJ _HmH sH tH P/P CTTOC hd CJOJ PJQJ _HmH sH tH T/T TOCPART id CJOJ PJQJ _HmH sH tH P/P TOCHB jd CJOJ PJQJ _HmH sH tH P/P TOCHC kd CJOJ PJQJ _HmH sH tH P/P TOCHD ld CJOJ PJQJ _HmH sH tH R/R CRHC md#5CJOJ PJQJ _HmH sH tH RoR CRHD nd#5CJOJ PJQJ _HmH sH tH JoJ CR od CJOJ PJQJ _HmH sH tH V/V CREDTI pd#5CJOJ PJQJ _HmH sH tH R/R CREDNM qd CJOJ PJQJ _HmH sH tH P/"P DED rd#6CJOJ PJQJ _HmH sH tH  Q2 CLs"B" frttBZRB Plain Textud CJOJ QJ 4 @b4 Footer v !4r4 Header w !HH 1 Balloon TextxCJOJ QJ ^J aJH>H -Titley$da$5CJ$OJQJ\aJ(( -ver12redToT :~ fontstyle01%56CJOJ QJ \]aJo(ph$ !ToT :~ fontstyle21%56CJOJPJ\]aJo(ph$ !j`j q Table Grid7:V}0}PK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭Vj\{cp/IDg6wZ0s=Dĵw %;r,qlEآyDQ"Q,=c8B,!gxMD&铁M./SAe^QשF½|SˌDإbj|E7C<bʼNpr8fnߧFrI.{1fVԅ$21(t}kJV1/ ÚQL×07#]fVIhcMZ6/Hߏ bW`Gv Ts'BCt!LQ#JxݴyJ] C:= ċ(tRQ;^e1/-/A_Y)^6(p[_&N}njzb\->;nVb*.7p]M|MMM# ud9c47=iV7̪~㦓ødfÕ 5j z'^9J{rJЃ3Ax| FU9…i3Q/B)LʾRPx)04N O'> agYeHj*kblC=hPW!alfpX OAXl:XVZbr Zy4Sw3?WӊhPxzSq]y 9N AAAWWWZ= ss%9 "%G 9 _ `'9  !#$&$./6>Z @ @ 0(  B S  ?H0(   7:H N 7:33_8;=!)57:_8;=)57:dߺr`s?2gL|֥ h^`OJ QJ ^J o(hHoh^`OJ QJ ^J o(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJ QJ ^J o(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJ QJ ^J o(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJ QJ ^J o(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJ QJ ^J o(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJ QJ ^J o(hHohPP^P`OJQJo(hH^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.r`sL|d                           $%  ,{Kh  gdd> S)]``REhgFc,{CU*{E+G2}ddK0U92_|Txa=AbiVTxa=ddQoXp<[Ab dd}oPp8VtU92Jzw P w0y{ wdd_|>iVG2}@ ~TTY5Zd ) 1 D7,kCMxT2@y$._p/<3CX !B||f q !"am"@#y%ZD&*R*B*o1+ T+ ,t,.-0U2Y$3Y3hN5m5F689V9d;k@<y)=&Q>I@E=DtEKJFHGC^KILlL^3MKT96VEV_VwVHZ%I[N[;\:E_`Ed2hvhB&jR]oroZp\pup qdqmsk"uv wx\yYy~"H5J !6=7OuzB im`]GaT5lCA ] ,X_<4,sQ4pL (*A7tBj,aF}lySG]Rw =Th"Q?rz,ESR`d:~\W"O?e$z^'i-K6fu%)RH 3EF~.O8 1luNl< ?-)4-/8=)y]Lkc`'GHsH9@9@UnknownG.[x Times New Roman5Symbol3. .[x Arial7. [ @Verdana9. . Segoe UIgJansonTextLTStd-RomanYu Gothic3.[x Times_ HelveticaNeueLTStd-LtArial_M HelveticaNeueLTStd-BdArial_ HelveticaNeueLTStd-MdArialO5 CourierCourier New?= .Cx Courier New5. .[`)TahomaC.,.{$ Calibri Light7..{$ Calibri;WingdingsA$BCambria Math"qHhgTgVgk&8 8 !20 3q@P ?02!xx..j WG4 System:Applications:Microsoft Office 2001:Templates:My Templates:Global_May_2002.dot(c)We Want to Hear from YouEnd UserJackleen Sougrakpam   Oh+'0 ( H T ` lx(c)We Want to Hear from You End UserGlobal_May_2002Jackleen Sougrakpam132Microsoft Office Word@z(@х@VDㅾ@?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[]^_`abcefghijknRoot Entry FԺ