Computer Support/Objectives/Security
Appearance
2.1 Summarize various security measures and their purposes.
[edit | edit source]
|
|
2.2 Compare and contrast wireless security protocols and authentication methods.
[edit | edit source]
|
|
2.3 Given a scenario, detect, remove, and prevent malware using the appropriate tools and methods.
[edit | edit source]
|
|
2.4 Explain common social-engineering attacks, threats, and vulnerabilities.
[edit | edit source]
|
|
2.5 Given a scenario, manage and configure basic security settings in the Microsoft Windows OS.
[edit | edit source]
|
|
2.6 Given a scenario, configure a workstation to meet best practices for security.
[edit | edit source]
|
|
2.7 Explain common methods for securing mobile and embedded devices.
[edit | edit source]
|
|
2.8 Given a scenario, use common data destruction and disposal methods
[edit | edit source]
|
|
2.9 Given a scenario, configure appropriate security settings on small office/home office (SOHO) wireless and wired networks.
[edit | edit source]
|
|
2.10 Given a scenario, install and configure browsers and relevant security settings.
[edit | edit source]
|
|