Introduction
This chapter covers the fifth objective of Domain 2.0, Threats, Vulnerabilities, and Mitigations, of the CompTIA Security+ exam.
In this chapter, we will consider the purpose of several mitigation techniques used to secure the enterprise, including segmentation, monitoring, and encryption. The final sections will review the decommissioning of systems and the hardening techniques we can employ to prevent vulnerabilities.
This chapter will give you an overview of why companies rely on these processes to keep their environments safe and ensure you are prepared to successfully answer all exam questions related to these concepts for your certification.
Note
A full breakdown of Exam Objective 2.5 will be provided at the end of the chapter.