0% found this document useful (0 votes)
49 views57 pages

Get CompTIA Security+ All-in-One Exam Guide (Exam SY0-501) 5th Edition Wm. Arthur Conklin PDF Ebook With Full Chapters Now

CompTIA

Uploaded by

alladoatlai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views57 pages

Get CompTIA Security+ All-in-One Exam Guide (Exam SY0-501) 5th Edition Wm. Arthur Conklin PDF Ebook With Full Chapters Now

CompTIA

Uploaded by

alladoatlai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 57

Full download ebook at ebookmass.

com

CompTIA Security+ All-in-One Exam Guide (Exam


SY0-501) 5th Edition Wm. Arthur Conklin

https://ebookmass.com/product/comptia-security-
all-in-one-exam-guide-exam-sy0-501-5th-edition-wm-
arthur-conklin/

Download more ebook from https://ebookmass.com


More products digital (pdf, epub, mobi) instant
download maybe you interests ...

CompTIA Security+ All-in-One Exam Guide (Exam SY0-601))


Wm. Arthur Conklin

https://ebookmass.com/product/comptia-security-all-in-one-exam-guide-
exam-sy0-601-wm-arthur-conklin/

ebookmass.com

CompTIA Security+ All-in-One Exam Guide, Sixth Edition


(Exam SY0-601)) Wm. Arthur Conklin

https://ebookmass.com/product/comptia-security-all-in-one-exam-guide-
sixth-edition-exam-sy0-601-wm-arthur-conklin/

ebookmass.com

CompTIA Security+ All in One Exam Guide, Fifth Edition


(Exam SY0 501) 5th Edition, (Ebook PDF)

https://ebookmass.com/product/comptia-security-all-in-one-exam-guide-
fifth-edition-exam-sy0-501-5th-edition-ebook-pdf/

ebookmass.com

CSSLP Certified Secure Software Lifecycle Professional


All-in-One Exam Guide, 3rd Edition Wm. Arthur Conklin

https://ebookmass.com/product/csslp-certified-secure-software-
lifecycle-professional-all-in-one-exam-guide-3rd-edition-wm-arthur-
conklin/
ebookmass.com
Mike Meyers' CompTIA Security+ Certification Guide, Second
Edition (Exam SY0-501) Mike Meyers

https://ebookmass.com/product/mike-meyers-comptia-security-
certification-guide-second-edition-exam-sy0-501-mike-meyers/

ebookmass.com

CSSLP SECURE SOFTWARE LIFECYCLE PROFESSIONAL ALL-IN-ONE


EXAM GUIDE, Third Edition, 3rd Edition Wm. Arthur Conklin
& Daniel Paul Shoemaker
https://ebookmass.com/product/csslp-secure-software-lifecycle-
professional-all-in-one-exam-guide-third-edition-3rd-edition-wm-
arthur-conklin-daniel-paul-shoemaker/
ebookmass.com

CSSLP SECURE SOFTWARE LIFECYCLE PROFESSIONAL ALL-IN-ONE


EXAM GUIDE, Third Edition, 3rd Edition Wm. Arthur Conklin
& Daniel Paul Shoemaker
https://ebookmass.com/product/csslp-secure-software-lifecycle-
professional-all-in-one-exam-guide-third-edition-3rd-edition-wm-
arthur-conklin-daniel-paul-shoemaker-2/
ebookmass.com

Mike Meyers’ CompTIA security+ certification passport,


(Exam SY0-501) Dawn Dunkerley

https://ebookmass.com/product/mike-meyers-comptia-security-
certification-passport-exam-sy0-501-dawn-dunkerley/

ebookmass.com

CompTIA Security+ Get Certified Get Ahead: SY0 501 Study


Guide (Ebook PDF)

https://ebookmass.com/product/comptia-security-get-certified-get-
ahead-sy0-501-study-guide-ebook-pdf/

ebookmass.com
All-In-One / CompTIA Security+® All-in-One Exam Guide, 5e / Conklin / 932-2 / Front Matter
Blind Folio: i

ALL IN ONE

CompTIA

Security+ ®

EXAM GUIDE
Fifth Edition (Exam SY0-501)

Dr. Wm. Arthur Conklin


Dr. Gregory White
Chuck Cothren
Roger L. Davis
Dwayne Williams

New York Chicago San Francisco


Athens London Madrid Mexico City
Milan New Delhi Singapore Sydney Toronto

McGraw-Hill Education is an independent entity from CompTIA®. This publication and CD-ROM may be used in assisting
students to prepare for the CompTIA Security+® exam. Neither CompTIA nor McGraw-Hill Education warrant that use
of this publication and CD-ROM will ensure passing any exam. CompTIA and CompTIA Security+ are trademarks or
registered trademarks of CompTIA in the United States and/or other countries. All other trademarks are trademarks of their
respective owners.

00-FM.indd 1 09/11/17 4:39 PM


All-In-One / CompTIA Security+® All-in-One Exam Guide, 5e / Conklin / 932-2 / Front Matter
Blind Folio: ii

Cataloging-in-Publication Data is on file with the Library of Congress

Names: Conklin, Wm. Arthur (William Arthur), author.


Title: CompTIA security+ all-in-one exam guide, (Exam SY0-501) / Dr. Wm.
Arthur Conklin, Dr. Gregory White, Chuck Cothren, Roger L. Davis, Dwayne
Williams.
Description: Fifth edition. | New York : McGraw-Hill Education, [2018]
Identifiers: LCCN 2017052997| ISBN 9781260019322 (set : alk. paper) | ISBN
9781260019315 (book : alk. paper) | ISBN 9781260019308 (CD) | ISBN
1260019322 (set : alk. paper) | ISBN 1260019314 (book : alk. paper) | ISBN
1260019306 (CD)
Subjects: LCSH: Computer security—Examinations—Study guides. | Computer
networks—Security measures—Examinations—Study guides. | Computer
technicians—Certification—Study guides. | Electronic data processing
personnel—Certification—Study guides.
Classification: LCC QA76.9.A25 .C667565 2018 | DDC 005.8—dc23 LC record available at
https://lccn.loc.gov/2017052997
McGraw-Hill Education books are available at special quantity discounts to use as premiums and sales promotions,
or for use in corporate training programs. To contact a representative, please visit the Contact Us pages at
www.mhprofessional.com.
CompTIA Security+® All-in-One Exam Guide, Fifth Edition (Exam SY0-501)
Copyright © 2018 by McGraw-Hill Education. All rights reserved. Printed in the United States of America.
Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or
distributed in any form or by any means, or stored in a database or retrieval system, without the prior written
permission of publisher, with the exception that the program listings may be entered, stored, and executed in
a computer system, but they may not be reproduced for publication.
All trademarks or copyrights mentioned herein are the possession of their respective owners and McGraw-Hill
Education makes no claim of ownership by the mention of products that contain these marks.
123456789 LCR 21 20 19 18 17
ISBN: Book p/n 978-1-260-01931-5 and CD p/n 978-1-260-01930-8
of set 978-1-260-01932-2
MHID: Book p/n 1-260-01931-4 and CD p/n 1-260-01930-6
of set 1-260-01932-2
Sponsoring Editor Technical Editor Production Supervisor
Amy Stonebraker Chris Crayton James Kussow
Editorial Supervisor Copy Editor Composition
Janet Walden William McManus Cenveo® Publisher Services
Project Editor Proofreader Illustration
Patty Mon Claire Splan Cenveo Publisher Services
Acquisitions Coordinator Indexer Art Director, Cover
Claire Yee Ted Laux Jeff Weeks
Information has been obtained by McGraw-Hill Education from sources believed to be reliable. However, because of the possibility
of human or mechanical error by our sources, McGraw-Hill Education, or others, McGraw-Hill Education does not guarantee the
accuracy, adequacy, or completeness of any information and is not responsible for any errors or omissions or the results obtained from
the use of such information.

00-FM.indd 2 09/11/17 4:39 PM


All-In-One / CompTIA Security+® All-in-One Exam Guide, 5e / Conklin / 932-2 / Front Matter
Blind Folio: iii

This book is dedicated to the many information security professionals who


quietly work to ensure the safety of our nation’s critical infrastructures.
We want to recognize the thousands of dedicated individuals who strive to
protect our national assets but who seldom receive praise and often are only
noticed when an incident occurs. To you, we say thank you for a job well done!

ABOUT THE AUTHORS


Dr. Wm. Arthur Conklin, CompTIA Security+, CISSP, CSSLP, GISCP, GCFA, GRID,
CRISC, CASP, is an Associate Professor and Director of the Center for Information
Security Research and Education in the College of Technology at the University of
Houston. He holds two terminal degrees, a Ph.D. in business administration (specializ-
ing in information security), from The University of Texas at San Antonio (UTSA), and
the degree Electrical Engineer (specializing in space systems engineering) from the Naval
Postgraduate School in Monterey, CA. He is a fellow of ISSA and a senior member of
ASQ, IEEE, and ACM. His research interests include the use of systems theory to explore
information security, specifically in cyber-physical systems. He has a strong interest in
cybersecurity education, and is involved with the NSA/DHS Centers of Academic Excel-
lence in Cyber Defense (CAE CD) and the NIST National Initiative for Cybersecurity
Education (NICE) Cybersecurity Workforce Framework (NICE Framework). He has
coauthored six security books and numerous academic articles associated with informa-
tion security. He is active in the DHS-sponsored Industrial Control Systems Joint Work-
ing Group (ICSJWG) efforts associated with workforce development and cybersecurity
aspects of industrial control systems. He has an extensive background in secure coding
and has been co-chair of the DHS/DoD Software Assurance Forum Working Group for
workforce education, training, and development.
Dr. Gregory White has been involved in computer and network security since 1986.
He spent 19 years on active duty with the United States Air Force and 11 years in the Air
Force Reserves in a variety of computer and security positions. He obtained his Ph.D. in
computer science from Texas A&M University in 1995. His dissertation topic was in the
area of computer network intrusion detection, and he continues to conduct research in
this area today. He is currently the Director for the Center for Infrastructure Assurance
and Security (CIAS) and is a professor of computer science at the University of Texas
at San Antonio (UTSA). Dr. White has written and presented numerous articles and
conference papers on security. He is also the coauthor of five textbooks on computer
and network security and has written chapters for two other security books. Dr. White
continues to be active in security research. His current research initiatives include efforts
in community incident response, intrusion detection, and secure information sharing.

00-FM.indd 3 09/11/17 4:39 PM


All-In-One / CompTIA Security+® All-in-One Exam Guide, 5e / Conklin / 932-2 / Front Matter
Blind Folio: iv

Chuck Cothren, CISSP, Security+, is a Field Engineer at Ionic Security applying over
20 years of information security experience in consulting, research, and enterprise envi-
ronments. He has assisted clients in a variety of industries including healthcare, banking,
information technology, retail, and manufacturing. He advises clients on topics such
as security architecture, penetration testing, training, consultant management, data loss
prevention, and encryption. He is coauthor of the books Voice and Data Security and
Principles of Computer Security.
Roger L. Davis, CISSP, CISM, CISA, is a Technical Account Manager for Microsoft
supporting enterprise-level companies. He has served as president of the Utah chapter
of the Information Systems Security Association (ISSA) and various board positions for
the Utah chapter of the Information Systems Audit and Control Association (ISACA).
He is a retired Air Force lieutenant colonel with 30 years of military and information
systems/security experience. Mr. Davis served on the faculty of Brigham Young University
and the Air Force Institute of Technology. He coauthored McGraw-Hill Education’s
Principles of Computer Security and Voice and Data Security. He holds a master’s degree in
computer science from George Washington University, a bachelor’s degree in computer
science from Brigham Young University, and performed post-graduate studies in electri-
cal engineering and computer science at the University of Colorado.
Dwayne Williams, CISSP, CASP, is Associate Director, Technology and Research,
for the Center for Infrastructure Assurance and Security at the University of Texas at
San Antonio and is the Director of the National Collegiate Cyber Defense Competi-
tion. Mr. Williams has over 24 years of experience in information systems and network
security. Mr. Williams’s experience includes six years of commissioned military service
as a Communications-Computer Information Systems Officer in the United States Air
Force, specializing in network security, corporate information protection, intrusion de-
tection systems, incident response, and VPN technology. Prior to joining the CIAS,
he served as Director of Consulting for SecureLogix Corporation, where he directed
and provided security assessment and integration services to Fortune 100, government,
public utility, oil and gas, financial, and technology clients. Mr. Williams graduated in
1993 from Baylor University with a bachelor of arts in computer science. Mr. Williams
is a coauthor of Voice and Data Security, Principles of Computer Security, and CompTIA
Security + All-in-One Exam Guide.

About the Technical Editor


Chris Crayton (MCSE) is an author, technical consultant, and trainer. He has worked
as a computer technology and networking instructor, information security director,
network administrator, network engineer, and PC specialist. Chris has authored several
print and online books on PC repair, CompTIA A+, CompTIA Security+, and Microsoft
Windows. He has also served as technical editor and content contributor on numer-
ous technical titles for several leading publishing companies. He holds numerous indus-
try certifications, has been recognized with many professional teaching awards, and has
served as a state-level SkillsUSA competition judge.

00-FM.indd 4 09/11/17 4:39 PM


All-In-One / CompTIA Security+® All-in-One Exam Guide, 5e / Conklin / 932-2 / Front Matter
Blind Folio: v

Becoming a CompTIA Certified


IT Professional Is Easy
It’s also the best way to reach greater professional opportunities and rewards.

Why Get CompTIA Certified?


Growing Demand
Labor estimates predict some technology fields will experience growth of more than 20%
by the year 2020. (Source: CompTIA 9th Annual Information Security Trends study:
500 U.S. IT and Business Executives Responsible for Security.) CompTIA certification
qualifies the skills required to join this workforce.

Higher Salaries
IT professionals with certifications on their resume command better jobs, earn higher
salaries, and have more doors open to new multi-industry opportunities.

Verified Strengths
91% of hiring managers indicate CompTIA certifications are valuable in validating
IT expertise, making certification the best way to demonstrate your competency and
knowledge to employers. (Source: CompTIA Employer Perceptions of IT Training and
Certification.)

Universal Skills
CompTIA certifications are vendor neutral—which means that certified professionals
can proficiently work with an extensive variety of hardware and software found in most
organizations.

00-FM.indd 5 09/11/17 4:39 PM


All-In-One / CompTIA Security+® All-in-One Exam Guide, 5e / Conklin / 932-2 / Front Matter
Blind Folio: vi

Learn more about what Purchase a voucher at a Congratulations on your


the exam covers by Pearson VUE testing center CompTIA certification!
reviewing the following: or at CompTIAstore.com. • Make sure to add your
• Exam objectives for • Register for your exam at a certification to your resume.
key study points. Pearson VUE testing center.
• Check out the CompTIA
• Sample questions for a general • Visit pearsonvue.com/CompTIA to Certification Roadmap to plan
overview of what to expect find the closest testing center to you. your next career move.
on the exam and examples
of question format. • Schedule the exam online. You will
be required to enter your voucher
• Visit online forums, like LinkedIn, to number or provide payment
see what other IT professionals say information at registration.
about CompTIA exams.
• Take your certification exam.

Learn More: Certification.CompTIA.org/securityplus

CompTIA Disclaimer
© 2016 CompTIA Properties, LLC, used under license by CompTIA Certifications,
LLC. All rights reserved. All certification programs and education related to such pro-
grams are operated exclusively by CompTIA Certifications, LLC. CompTIA is a regis-
tered trademark of CompTIA Properties, LLC in the U.S. and internationally. Other
brands and company names mentioned herein may be trademarks or service marks of
CompTIA Properties, LLC or of their respective owners. Reproduction or dissemination
of this courseware sheet is prohibited without written consent of CompTIA Properties,
LLC. Printed in the U.S. 02544-Mar2016.
The logo of the CompTIA Approved Quality Curriculum Program and the status of
this or other training material as “Approved” under the CompTIA Approved Curriculum
Program signifies that, in CompTIA’s opinion, such training material covers the content
of CompTIA’s related certification exam. CompTIA has not reviewed or approved the
accuracy of the contents of this training material and specifically disclaims any warran-
ties of merchantability or fitness for a particular purpose. CompTIA makes no guarantee
concerning the success of persons using any such “Approved” or other training material
in order to prepare for any CompTIA certification exam.

00-FM.indd 6 09/11/17 4:39 PM


All-In-One / CompTIA Security+® All-in-One Exam Guide, 5e / Conklin / 932-2 / Front Matter

CONTENTS AT A GLANCE

Part I Threats, Attacks, and Vulnerabilities


Chapter 1 Malware and Indicators of Compromise. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Chapter 2 Attacks.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Chapter 3 Threat Actors.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Chapter 4 Vulnerability Scanning and Penetration Testing.. . . . . . . . . . . . . . . . . . . . . . . . 71
Chapter 5 Vulnerabilities and Impacts.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

Part II Technologies and Tools


Chapter 6 Network Components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Chapter 7 Security Tools and Technologies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Chapter 8 Troubleshooting Common Security Issues.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Chapter 9 Mobile Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Chapter 10 Implementing Secure Protocols. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203

Part III Architecture and Design


Chapter 11 Architecture Frameworks and Secure Network Architectures.. . . . . . . 215
Chapter 12 Secure Systems Design and Deployment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
Chapter 13 Embedded Systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
Chapter 14 Application Development and Deployment.. . . . . . . . . . . . . . . . . . . . . . . . . . 275
Chapter 15 Cloud and Virtualization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
Chapter 16 Resiliency and Automation Strategies.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
Chapter 17 Physical Security Controls. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321

Part IV Identity and Access Management


Chapter 18 Identity, Access, and Accounts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
Chapter 19 Identity and Access Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
Chapter 20 Identity and Access Management Controls. . . . . . . . . . . . . . . . . . . . . . . . . . . . 379

vii

00-FM.indd 7 09/11/17 4:39 PM


Visit https://ebookmass.com
now to explore a rich
collection of eBooks and enjoy
exciting offers!
All-In-One / CompTIA Security+® All-in-One Exam Guide, 5e / Conklin / 932-2 / Front Matter

CompTIA Security+ All-in-One Exam Guide


viii
Part V Risk Management
Chapter 21 Policies, Plans, and Procedures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
Chapter 22 Risk Management and Business Impact Analysis.. . . . . . . . . . . . . . . . . . . . . 419
Chapter 23 Incident Response, Disaster Recovery,
and Continuity of Operations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
Chapter 24 Digital Forensics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461
Chapter 25 Data Security and Privacy Practices.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477

Part VI Cryptography and Public Key Infrastructure


Chapter 26 Cryptographic Concepts.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Chapter 27 Cryptographic Algorithms.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513
Chapter 28 Wireless Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529
Chapter 29 Public Key Infrastructure.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543

Part VII Appendixes and Glossary


Appendix A OSI Model and Internet Protocols.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573
Appendix B About the CD-ROM.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583
Glossary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585

Index.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 619

00-FM.indd 8 09/11/17 4:39 PM


All-In-One / CompTIA Security+® All-in-One Exam Guide, 5e / Conklin / 932-2 / Front Matter

CONTENTS

Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxii
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxiii
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxiv
Objective Map: Exam SY0-501 . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxix

Part I Threats, Attacks, and Vulnerabilities


Chapter 1 Malware and Indicators of Compromise . . . . . . . . . . . . . . . . . . . . . . . 3
Malware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Polymorphic Malware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Viruses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Crypto-malware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Ransomware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Worm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Trojan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Rootkit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Keylogger . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Adware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Spyware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Bots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
RAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Logic Bomb . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Backdoor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Indicators of Compromise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Chapter 2 Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Social Engineering Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Phishing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Spear Phishing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Whaling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Vishing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Tailgating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Impersonation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Dumpster Diving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Shoulder Surfing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

ix

00-FM.indd 9 09/11/17 4:39 PM


All-In-One / CompTIA Security+® All-in-One Exam Guide, 5e / Conklin / 932-2 / Front Matter

CompTIA Security+ All-in-One Exam Guide


x
Hoax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Watering Hole Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Social Engineering Principles . . . . . . . . . . . . . . . . . . . . . . . . . 23
Application/Service Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
DoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
DDoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Man-in-the-Middle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Buffer Overflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Injection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Cross-Site Scripting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Cross-Site Request Forgery . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Privilege Escalation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
ARP Poisoning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Amplification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
DNS Poisoning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Domain Hijacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Man-in-the-Browser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Zero Day . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Replay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Pass the Hash . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Hijacking and Related Attacks . . . . . . . . . . . . . . . . . . . . . . . . 37
Driver Manipulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Spoofing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
MAC Spoofing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
IP Address Spoofing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Wireless Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Replay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
IV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Evil Twin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Rogue AP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Jamming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
WPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Bluejacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Bluesnarfing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
RFID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
NFC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Disassociation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Cryptographic Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Birthday . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Known Plaintext/Ciphertext . . . . . . . . . . . . . . . . . . . . . . . . . 47
Password Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Rainbow Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Dictionary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Brute Force . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Hybrid Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

00-FM.indd 10 09/11/17 4:39 PM


All-In-One / CompTIA Security+® All-in-One Exam Guide, 5e / Conklin / 932-2 / Front Matter

Contents
xi
Collision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Downgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Replay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Weak Implementations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Chapter 3 Threat Actors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Types of Actors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Script Kiddies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Hacktivists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Organized Crime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Nation States/APT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Insiders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Competitors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Attributes of Actors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Internal/External . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Level of Sophistication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Resources/Funding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Intent/Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Use of Open Source Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Chapter 4 Vulnerability Scanning and Penetration Testing . . . . . . . . . . . . . . . . 71
Penetration Testing Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Active Reconnaissance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Passive Reconnaissance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Pivot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Initial Exploitation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Persistence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Escalation of Privilege . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Black Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
White Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Gray Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Pen Testing vs. Vulnerability Scanning . . . . . . . . . . . . . . . . . . 76
Vulnerability Scanning Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Passively Test Security Controls . . . . . . . . . . . . . . . . . . . . . . . 76
Identify Vulnerability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Identify Lack of Security Controls . . . . . . . . . . . . . . . . . . . . . 77
Identify Common Misconfigurations . . . . . . . . . . . . . . . . . . . 77
Intrusive vs. Non-intrusive . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Credentialed vs. Non-credentialed . . . . . . . . . . . . . . . . . . . . . 77
False Positive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77

00-FM.indd 11 09/11/17 4:39 PM


All-In-One / CompTIA Security+® All-in-One Exam Guide, 5e / Conklin / 932-2 / Front Matter

CompTIA Security+ All-in-One Exam Guide


xii
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Chapter 5 Vulnerabilities and Impacts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Race Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
System Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
End-of-Life Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Embedded Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Lack of Vendor Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Improper Input Handling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Improper Error Handling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Misconfiguration/Weak Configuration . . . . . . . . . . . . . . . . . . . . . . 87
Default Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Resource Exhaustion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Untrained Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Improperly Configured Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Vulnerable Business Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Weak Cipher Suites and Implementations . . . . . . . . . . . . . . . . . . . . 89
Memory/Buffer Vulnerability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Memory Leak . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Integer Overflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Buffer Overflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Pointer Dereference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
DLL Injection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
System Sprawl/Undocumented Assets . . . . . . . . . . . . . . . . . . . . . . . 92
Architecture/Design Weaknesses . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
New Threats/Zero Day . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Improper Certificate and Key Management . . . . . . . . . . . . . . . . . . 94
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98

Part II Technologies and Tools


Chapter 6 Network Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
How Do Firewalls Work? . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Firewall Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
ACL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Application-Based vs. Network-Based . . . . . . . . . . . . . . . . . . 106
Stateful vs. Stateless . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Implicit Deny . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Secure Network Administration Principles . . . . . . . . . . . . . . 108
Rule-Based Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108

00-FM.indd 12 09/11/17 4:39 PM


All-In-One / CompTIA Security+® All-in-One Exam Guide, 5e / Conklin / 932-2 / Front Matter

Contents
xiii
VPN Concentrator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Remote Access vs. Site-to-Site . . . . . . . . . . . . . . . . . . . . . . . . 108
IPSec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Split Tunnel vs. Full Tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . 115
TLS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Always-on VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
NIPS/NIDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Signature-Based . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Heuristic/Behavioral . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Anomaly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Inline vs. Passive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
In-Band vs. Out-of-Band . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Analytics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Antispoofing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Layer 2 vs. Layer 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Loop Prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Flood Guard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Forward and Reverse Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Transparent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Application/Multipurpose . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Load Balancer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Active-Passive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Active-Active . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Virtual IPs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Access Point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
SSID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
MAC Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Signal Strength . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Band Selection/Width . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Antenna Types and Placement . . . . . . . . . . . . . . . . . . . . . . . . 129
Fat vs. Thin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Controller-Based vs. Standalone . . . . . . . . . . . . . . . . . . . . . . 130
SIEM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Correlation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Automated Alerting and Triggers . . . . . . . . . . . . . . . . . . . . . . 131
Time Synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Event Deduplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Logs/WORM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132

00-FM.indd 13 09/11/17 4:39 PM


All-In-One / CompTIA Security+® All-in-One Exam Guide, 5e / Conklin / 932-2 / Front Matter

CompTIA Security+ All-in-One Exam Guide


xiv
DLP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
USB Blocking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Cloud-Based . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
E-mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
NAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Dissolvable vs. Permanent . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Host Health Checks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Agent vs. Agentless . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Mail Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Spam Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
DLP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Bridge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
SSL/TLS Accelerators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
SSL Decryptors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Media Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Hardware Security Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Chapter 7 Security Tools and Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Protocol Analyzer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Switched Port Analyzer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Network Scanners . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Rogue System Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Network Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Wireless Scanners/Cracker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Password Cracker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Vulnerability Scanner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Configuration Compliance Scanner . . . . . . . . . . . . . . . . . . . . . . . . 153
Exploitation Frameworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Data Sanitization Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Steganography Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Honeypot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Backup Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Banner Grabbing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Passive vs. Active . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Command-Line Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
netstat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
tracert . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
nslookup/dig . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
arp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
ipconfig/ip/ifconfig . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160

00-FM.indd 14 09/11/17 4:39 PM


Visit https://ebookmass.com
now to explore a rich
collection of eBooks and enjoy
exciting offers!
All-In-One / CompTIA Security+® All-in-One Exam Guide, 5e / Conklin / 932-2 / Front Matter

Contents
xv
tcpdump . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
nmap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
netcat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Security Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
HIDS/HIPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
File Integrity Check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Host-Based Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Application Whitelisting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Removable Media Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Advanced Malware Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Patch Management Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
UTM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
DLP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Data Execution Prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Web Application Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Chapter 8 Troubleshooting Common Security Issues . . . . . . . . . . . . . . . . . . . . . 169
Unencrypted Credentials/Clear Text . . . . . . . . . . . . . . . . . . . . . . . . 169
Logs and Events Anomalies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Permission Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Access Violations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Certificate Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Data Exfiltration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Misconfigured Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Content Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Access Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Weak Security Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Personnel Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Policy Violation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Insider Threat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Social Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Social Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Personal E-mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Unauthorized Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Baseline Deviation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
License Compliance Violation (Availability/Integrity) . . . . . . . . . . . 176
Asset Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Authentication Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180

00-FM.indd 15 09/11/17 4:39 PM


All-In-One / CompTIA Security+® All-in-One Exam Guide, 5e / Conklin / 932-2 / Front Matter

CompTIA Security+ All-in-One Exam Guide


xvi
Chapter 9 Mobile Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Connection Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Cellular . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
Wi-Fi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
SATCOM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
Bluetooth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
NFC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
ANT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Infrared . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
USB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
Mobile Device Management Concepts . . . . . . . . . . . . . . . . . . . . . . 187
Application Management . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
Content Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Remote Wipe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Geofencing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Geolocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Screen Locks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Push Notification Services . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Passwords and Pins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Biometrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Context-Aware Authentication . . . . . . . . . . . . . . . . . . . . . . . 191
Containerization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Storage Segmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Full Device Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Enforcement and Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Third-Party App Stores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Rooting/Jailbreaking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Sideloading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Custom Firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Carrier Unlocking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Firmware OTA Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Camera Use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
SMS/MMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
External Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
USB OTG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
Recording Microphone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
GPS Tagging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Wi-Fi Direct/Ad Hoc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Tethering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
Payment Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
Deployment Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
BYOD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
CYOD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
COPE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197

00-FM.indd 16 09/11/17 4:39 PM


All-In-One / CompTIA Security+® All-in-One Exam Guide, 5e / Conklin / 932-2 / Front Matter

Contents
xvii
Corporate-Owned . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
VDI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
Chapter 10 Implementing Secure Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Secure Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
DNSSEC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
SSH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
S/MIME . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
SRTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
LDAPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
FTPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
SFTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
SNMPv3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
SSL/TLS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
HTTPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Secure POP/IMAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Use Cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Voice and Video . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
Time Synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
E-mail and Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
File Transfer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
Directory Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
Domain Name Resolution . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
Routing and Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
Network Address Allocation . . . . . . . . . . . . . . . . . . . . . . . . . 208
Subscription Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212

Part III Architecture and Design


Chapter 11 Architecture Frameworks and Secure Network Architectures . . . 215
Industry-Standard Frameworks and Reference Architectures . . . . . . 216
Regulatory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
Non-regulatory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
National vs. International . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Industry-Specific Frameworks . . . . . . . . . . . . . . . . . . . . . . . . 217
Benchmarks/Secure Configuration Guides . . . . . . . . . . . . . . . . . . . 217
Platform/Vendor-Specific Guides . . . . . . . . . . . . . . . . . . . . . 218
General Purpose Guides . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219

00-FM.indd 17 09/11/17 4:39 PM


All-In-One / CompTIA Security+® All-in-One Exam Guide, 5e / Conklin / 932-2 / Front Matter

CompTIA Security+ All-in-One Exam Guide


xviii
Defense-in-Depth/Layered Security . . . . . . . . . . . . . . . . . . . . . . . . 220
Vendor Diversity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
Control Diversity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
User Training . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Zones/Topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
DMZ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
Extranet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Intranet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Wireless . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Guest . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Honeynets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Ad Hoc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Segregation/Segmentation/Isolation . . . . . . . . . . . . . . . . . . . . . . . . 228
Physical . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
Logical (VLAN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
Virtualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Air Gaps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Tunneling/VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
Site-to-Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
Security Device/Technology Placement . . . . . . . . . . . . . . . . . . . . . . 232
Sensors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
Collectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
Correlation Engines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
Proxies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
VPN Concentrators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
SSL Accelerators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
Load Balancers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
DDoS Mitigator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
Aggregation Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
Taps and Port Mirror . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
SDN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
Chapter 12 Secure Systems Design and Deployment . . . . . . . . . . . . . . . . . . . . . . 241
Hardware/Firmware Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
FDE/SED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
TPM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
HSM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
UEFI/BIOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
Secure Boot and Attestation . . . . . . . . . . . . . . . . . . . . . . . . . 243

00-FM.indd 18 09/11/17 4:39 PM


All-In-One / CompTIA Security+® All-in-One Exam Guide, 5e / Conklin / 932-2 / Front Matter

Contents
xix
Supply Chain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
Hardware Root of Trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
EMI/EMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
Operating Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
Patch Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
Disabling Unnecessary Ports and Services . . . . . . . . . . . . . . . 247
Least Functionality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
Secure Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
Trusted Operating System . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Application Whitelisting/Blacklisting . . . . . . . . . . . . . . . . . . 249
Disable Default Accounts/Passwords . . . . . . . . . . . . . . . . . . . 250
Peripherals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
Wireless Keyboards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
Wireless Mice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
Displays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
Wi-Fi-Enabled MicroSD Cards . . . . . . . . . . . . . . . . . . . . . . . 251
Printers/MFDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
External Storage Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
Digital Cameras . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
Sandboxing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
Staging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
Production . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
Secure Baseline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
Integrity Measurement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
Chapter 13 Embedded Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
SCADA/ICS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
Smart Devices/IoT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
Wearable Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
Home Automation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
HVAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
SoC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
RTOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
Printers/MFDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Camera Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Special Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
Medical Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
Vehicles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Aircraft/UAV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267

00-FM.indd 19 09/11/17 4:39 PM


All-In-One / CompTIA Security+® All-in-One Exam Guide, 5e / Conklin / 932-2 / Front Matter

CompTIA Security+ All-in-One Exam Guide


xx
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
Chapter 14 Application Development and Deployment . . . . . . . . . . . . . . . . . . . 275
Development Lifecycle Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Waterfall vs. Agile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Secure DevOps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Security Automation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
Continuous Integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
Baselining . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
Immutable Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Infrastructure as Code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Version Control and Change Management . . . . . . . . . . . . . . . . . . . 279
Provisioning and Deprovisioning . . . . . . . . . . . . . . . . . . . . . . . . . . 280
Secure Coding Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
Proper Error Handling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Proper Input Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Normalization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
Stored Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
Code Signing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
Obfuscation/Camouflage . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
Code Reuse/Dead Code . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
Server-Side vs. Client-Side Execution and Validation . . . . . . . 284
Memory Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
Use of Third-Party Libraries and SDKs . . . . . . . . . . . . . . . . . 285
Data Exposure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
Code Quality and Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
Static Code Analyzers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
Dynamic Analysis (e.g., Fuzzing) . . . . . . . . . . . . . . . . . . . . . . 286
Stress Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
Sandboxing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
Model Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
Compiled vs. Runtime Code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
Chapter 15 Cloud and Virtualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
Hypervisor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
Type I . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
Type II . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
Application Cells/Containers . . . . . . . . . . . . . . . . . . . . . . . . . 296
VM Sprawl Avoidance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
VM Escape Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297

00-FM.indd 20 09/11/17 4:39 PM


Random documents with unrelated
content Scribd suggests to you:
great council, respecting the welfare and surrender of the city of
Rouen.
In consequence of this resolution, the official of the town was sent
to the king at Pont de l'Arche to obtain a safe conduct for certain
persons therein named, to treat of peace,—which being granted, the
official returned to the archbishop and the duke. The archbishop,
and some knights and esquires on the part of the duke of Somerset,
together with certain of the townsmen, were sent to Port St
Ouen[55], within a league of Pont de l'Arche, where they met, on the
part of the king of France, his lieutenant-general the count de
Dunois, the chancellor of France, the seneschal of Poitou, sir William
de Cousinot, and some others. They had a long conference, in which
the deputies from Rouen insisted on a general amnesty being
granted, and that such as chose might depart with the English, and
all who preferred to stay should have the enjoyment of their
fortunes unmolested. It was also stipulated, that the English and
their party should have safe conducts for themselves and their
effects, when they marched away. All these demands having been
agreed to by the count de Dunois and the king's counsellors, the
archbishop and his associates promised to deliver up the town to the
king's obedience.
The archbishop and his companions then departed, to make their
report to the English and the citizens of Rouen,—but as they arrived
in the night, they could not do it until the following day. On the 18th,
therefore, the archbishop and the other deputies went very early to
the town-hall, and related every thing that had passed between
them and the ministers from the king of France, which was very
agreeable to the inhabitants, but sorely displeasing to the English,
who, when they saw the strong inclinations of the townsmen to turn
to the french interest, were greatly astonished, more especially the
duke of Somerset and the lord Talbot. They therefore left the town-
hall much discontented, and, instantly arming themselves, withdrew
to the government-palace, the bridges, and portals of the castle.
The citizens, having observed their motions, began to take alarm,
and armed themselves also. They, as well as the English, kept up a
strong guard the whole of this Saturday, and likewise during the
night; but the townsmen, anxious to expel the English for refusing to
accept of the terms the deputies had agreed to, sent a messenger to
Pont de l'Arche, who arrived there on Sunday by day-break, to
inform the king, that if he would send a force to their relief, it should
have free entrance into the town.
On this same Sunday, the 19th day of October, about eight o'clock in
the morning, the whole of the inhabitants were under arms, and on
their guard against any attempts of the English,—when they
attacked all of that nation whom they found in the streets so sharply
that it was with difficulty that they could join their companions on
the bridge, and in the palace and castle. In the pursuit, from seven
to eight English were killed,—and the townsmen gained possession,
in the interim, of the principal gates of the town.
The count de Dunois lost no time in hastening to the relief of Rouen,
but instantly mounted his horse, attended by a large company of
men at arms. In the number was Flocquet, bailiff of Evreux; but in
his hurry, he forgot to put his greaves on, and was so badly kicked
by one of the horses of his troop that his leg was broken, and he
was carried back to be cured at Pont de l'Arche, after he had given
the command of his men to the lord de Maulny.
On the arrival of this force before Rouen, those within St Catherine's
were summoned to surrender the place to the king of France, who
had, during the summons, set out from Pont de l'Arche, grandly
accompanied by men at arms and archers, to appear personally
before the walls of Rouen. He had ordered his artillery to be
charged, for an immediate attack on his arrival at St Catherine's,
although there was no necessity,—for the governor of the place,
having six score English under his orders, seeing so noble a
company, and knowing that the king was on the road, fearful also of
the event, if he made any resistance, surrendered it to the count de
Dunois, and he and his garrison marched away whither they
pleased. The bailiff of Evreux was appointed governor, until the king
should otherwise dispose of it. A herald was sent with the english
garrison of St Catherine's, to answer for their safety, and to conduct
them to Port St Ouen. On their march, they met the king, who bade
them take nothing from the poor people without paying for it; but as
they said they had no money, he gave them the sum of one hundred
francs to defray the expences,—and then they continued their march
with their baggage, of which, indeed, they had little, to Honfleur, or
wherever else they pleased. The king took up his quarters that night
at St Catherine's, with the intent to accomplish his enterprise.
To gain the city of Rouen, the count de Dunois, the count de Nevers,
the lord d'Orval, the lord de Blainville and the lord de Maulny,
advanced with all their men, with the king's banners displayed,
before that gate of Rouen called Martinville, and drew up in battle-
array near to the bulwark of the gate. The citizens came out with the
keys of the gates and presented them to the count de Dunois,—at
the same time pressing him to enter the town with as many of his
men as he pleased. The count replied, that he would act as should
be most agreeable to them, when, after some further conversation
respecting the welfare of the city, sir Pierre de Brézé, seneschal of
Poitou, was ordered to enter with one hundred lances and his
archers, the lord de Maulny with the same number of lances, and
the archers of Robert de Flocques, and one hundred lances and
archers from the men of the count de Dunois.
They posted themselves as near to the English as they could,
namely the men of the count de Dunois in front of the government-
palace, in which were the duke of Somerset and lord Talbot, with
twelve hundred English,—the lord de Maulny between the palace
and the castle, and the seneschal of Poitou facing the castle. The
other captains were encamped in the fields, and posted in the
villages on the side toward the countries of Caux and Beauvoisis.
The king's army was a fine sight; for never, in the memory of man,
had the king so grand or so numerous an assembly of lords, barons,
knights and esquires, with common men, as were now under his
orders.
This evening, the English surrendered the bridge, the guard of which
was given to the lord de Herunville,—and, on the morrow, the gates
of the town were thrown open, for all to enter or go out as they
pleased.
The duke of Somerset was afflicted at heart to see the great army
the king had brought against him, and demanded a conference with
him. On this being told the king, he was well pleased to agree to it.
In consequence, the duke of Somerset set out, on the fifth day
afterward, from the palace, accompanied by a certain number of
persons, and by some of the king's heralds, who escorted him to St
Catherine's on the mount of Rouen, where the king received him,
attended by the king of Sicily, the count de Dunois, and others of his
council and blood: the patriarch of Antioch, the Archbishop of
Rouen, and other prelates, were likewise present. After the usual
salutations, and when the duke had paid his respects to the king, he
requested that his majesty would be pleased to allow him and lord
Talbot, with the men under their command, to march away with
their baggage in safety, according to the terms of the general
amnesty which had been agreed to by the lords of his council.
The king deliberately and prudently replied, that his request was
unreasonable, because they had refused to accept or adhere to the
terms of the amnesty; but in contempt of it had held, and now did
hold, the palace and castle contrary to his will, and had also done
every thing in their power to prevent the inhabitants of Rouen from
surrendering their town. The amnesty had, therefore, been annulled
by their own conduct; and before they were suffered to leave the
palace, Honfleur, Harfleur, and all places in the country of Caux, now
in the hands of the king of England, must be given up to him.
The duke of Somerset, on receiving this answer, took leave of the
king and returned to the palace, and saw every one, in all the
streets he passed through, wearing the white cross, which did not
tend to raise his spirits. He was escorted back by the counts of Eu
and of Clermont.

FOOTNOTES:
[55] St Ouen. I believe there must be some mistake, for there is
no St Ouen near to Pont de l'Arche; but a St Ouen seems to be
within a league of Elbeuf, which is near to Pont de l'Arche.
CHAP. XIII.
THE KING OF FRANCE BESIEGES THE DUKE OF
SOMERSET, LORD TALBOT, AND THEIR MEN, IN THE
GOVERNMENT-PALACE OF ROUEN.—THEY SURRENDER,
ON CONDITION OF BEING ALLOWED TO MARCH AWAY
ON YIELDING UP THE CASTLE OF ARQUES[56], AND
OTHER PLACES MENTIONED.
On Wednesday, the 22d of October the king of France commanded
the government-palace and the castle of Rouen to be besieged at
the same time. Eight hundred lances, with the archers, were ordered
on this service, who made deep trenches round the palace, as well
in the town as in the fields. Bombards and cannon were pointed
against the gates that opened to the country and town. All these
preparations greatly dismayed the duke of Somerset. Having
considered that there was very little provision or stores within the
palace, and a great many men, and that there was not a possibility
of his being relieved, he requested, on the 28th of the same month,
that the king would permit him to speak with him, which the king
kindly granted. The duke left the palace accompanied by about forty
of his principal knights and esquires: he was dressed in a long robe
of blue figured velvet, lined with sables, having on his head a
crimson-velvet bonnet, trimmed also with sables. The king's heralds
escorted him through the tower to the sallyport leading to St
Catherine's, where he was met by the count de Clermont, eldest son
to the duke of Bourbon, and other knights and esquires, who
conducted him to St Catherine's where the king received him very
kindly, in an apartment most richly decorated.
The king had with him, at this audience, the king of Sicily, the counts
of Maine, of Dunois, of Nevers, of Clermont, of St Pol, of Castres, of
Tancarville, the viscount of Loumaigne, and so many great lords and
knights that it would be tiresome to name them all. When the duke
had saluted the king, he requested that his majesty would be
pleased to grant to him, and the English in the palace and castle, the
same capitulation he had granted to the town.
The king replied aloud, and in handsome terms, that the same
capitulation had been granted them at the conference at St Ouen,
but that neither himself nor his countrymen, like ill-advised persons,
would accept of it: his request was therefore so unreasonable that
he could not grant it. The duke then took his leave of the king and
returned, with those who had accompanied him, to the palace,
escorted, for his security, by the counts of Clermont, of Eu, and of
Castres.
The king ordered the count de Dunois to push forward his
approaches to the palace with the greatest vigour, on the side
toward the country as well as on that toward the town. The
lieutenant-general obeyed this order with so much activity, valour
and prudence, that the English were completely blockaded in both
the castle and the palace.
The English now demanded a parley with the count de Dunois, and a
truce was concluded between them. The bailiff of Evreux, the
marshal de la Fayette, and others of the king's council were called in
to the conference, when the truce was prolonged from day to day,
for the space of twelve days, because the English would not leave
the lord Talbot as an hostage for the performance of the treaty. After
many discussions, it was at length agreed that the duke of
Somerset, lieutenant of the king of England, his lady, children, and
all the English within the palace and castle should depart in safety
with their effects whithersoever they pleased, leaving behind the
prisoners and heavy artillery. They were bound to pay the king of
France the sum of fifty thousand crowns within the twelvemonth,
and to those who had concluded this treaty six thousand. They also
promised faithfully to pay every thing they owed to the innkeepers,
townsmen, tradesmen and others of Rouen.
The duke of Somerset and his companions were besides bounden to
deliver up the castle of Arques, the town of Caudebec, the castle of
Tancarville, and L'isle-bonne, the towns of Honfleur and
Monstierville, to the king of France, or to such commissioners as he
should appoint to receive them. For the fulfilment of these
engagements, the duke of Somerset gave written promises, and also
left, as hostages for their performance, lord Talbot, the sons of lord
Abergavenny, of lord Roos, and of the duchess of Somerset, of the
earl of Ormond in Ireland, and two other english noblemen.
On the conclusion of this treaty, the duke of Somerset and the
English departed from the palace on the 4th day of November, and
went strait to the town of Harfleur,—some by water, others by land.
The hostages remained under the care of the king's commissaries in
Rouen. The duke of Somerset, before his departure, had directed sir
Thomas Hou and Fulk Hou[57] to restore to the king of France the
places mentioned in the treaty; which was done, excepting Honfleur,
—for the governor, called master Thomas Courson, refused to
surrender it,—and the lord Talbot, therefore, remained prisoner to
the king. On Monday, the 10th of November, the eve of the feast of
St Martin, the count de Dunois and the bailiff of Rouen had the
king's banner displayed from the castle, palace, and walls of the city,
by one of the king's heralds, and in the presence of the principal
inhabitants.

FOOTNOTES:
[56] Arques,—two leagues from Dieppe.
[57] Sir Thomas Hou, &c. Q. Howe? Berry changes the names
into Heu and Heston. See Hollingshed, &c.
CHAP. XIV.
THE KING OF FRANCE MAKES A GRAND ENTRY INTO
ROUEN.—HE IS SUMPTUOUSLY RECEIVED.—THE ENGLISH
RESTORE TO THE KING THE CASTLE OF ARGUES,
CAUDEBEC, TANCARVILLE, MONSTIERVILLE, &c.
While the negotiations were carrying on with the English, the king of
France celebrated the feasts of All-saints in St Catherine's with the
utmost joy on seeing his enemies fall before him,—and he returned
thanks to God for the good fortune that was daily pouring in upon
him. The count de Dunois having restored good government in the
town of Rouen, the king prepared to make his solemn entry into it.
He set out from St Catherine's on this same Monday, about one
o'clock after midday, attended by the king of Sicily, and several great
princes, as well of his blood as otherwise, with his army drawn out in
handsome array. First marched his archers, the leaders of whom
were dressed in striped jackets of red, white and green, covered
with embroidery. After these came the archers of the king of Sicily,
of the count du Maine, and of other great lords, to the number of six
hundred, well mounted, and all armed with plate armour, under
jackets of various colours, having greaves, swords, daggers and
helmets, richly ornamented with silver. The king appointed the lords
de Preuilly and de Cléré, sir Theaulde de Valperge, and a few more,
to command them, who had their horses covered with satin
housings of different forms and colours.
After the archers came the heralds of the king of France, the king of
Sicily, and the other princes in company with the king, all dressed in
their tabards of arms,—and with them were some pursuivants. Then
came the trumpeters and clarions, who sounded so loudly that it was
very melodious, and gave much delight to hear them: the king's
trumpeters were clothed in crimson, having their sleeves covered
with embroidery.
Next came sir William Juvenal des Ursins, knight, lord of Trainel and
chancellor of France, dressed in his robes of ceremony, namely, a
robe, mantle and hood of scarlet, trimmed with minever, and on
each of his shoulders were golden ribbands, interlaced with strips of
fur. Before him walked two footmen, leading by the bridle a white
hackney, covered with a housing of blue velvet, besprinkled with
flowers de luce and gold tissue. On this housing was placed a small
coffer, covered also with blue velvet and flowers de luce in
silversmith's work, in which were the seals of the king. After him
rode an equerry of the stables, called Pierre Fonteville[58], fully
armed, and mounted on a charger covered with housings of azure
velvet, having great clasps of silver gilt: he had on his head a
pointed hat, with the point trimmed with crimson-velvet and ermine.
He bore before him, in a scarf, the royal mantle of scarlet,
ornamented with purple fringes and ermine. Next came, without any
interval between him and the king, the lord de Saintrailles, grand
equerry of the royal stables, and bailiff of Berry. He was in complete
armour, mounted on a charger with similar housings and clasps as
the said Fonteville, and bore in a scarf the royal sword of state,
whose handle, cross and sheath, were covered with blue velvet,
besprinkled with flowers de luce of gold.
Then came the king, in complete armour, on a stately charger with
housings, reaching to the ground, of blue velvet, covered with
flowers de luce in embroidery. On his head was a beaver hat lined
with crimson velvet, having on the crown a tuft of gold thread. He
was followed by his pages dressed in crimson,—their sleeves
covered with silver plates, the armour of their horses' heads was of
fine gold, variously ornamented, and with plumes of ostrich feathers
of divers colours. On the right of the king rode the king of Sicily, and
on the left his brother the count of Maine, both in full armour, their
horses richly ornamented, with similar housings, having white
crosses, and their devices intermixed with tufts of gold thread. Their
pages' horses had the like housings,—but their head-armour was of
fine gold with their devices.
After them came the counts de Nevers, de St Pol, and de Clermont.
The first was mounted, fully armed, on a charger covered with green
velvet embroidered with gold, and followed by three pages dressed
in violet and black: he was also accompanied by twelve gentlemen
completely armed, mounted on horses covered with violet-coloured
satin: each housing bore a white cross, except one whose housing
was of green satin. The count de St Pol was likewise in full armour,
mounted on a charger having a housing of black satin covered with
silversmith's work and embroidery. His five pages were clothed in
black satin, slashed below, which slashes were covered with
silversmith's work: the housings of their horses were the same. One
of them bore a lance covered with crimson-velvet, another a lance
covered with figured gold tissue, and the third bore on his head an
helmet of fine gold richly ornamented; and behind these pages was
his groom handsomely dressed, with the housings of his horse
similar to the others, leading a handsome charger in hand. The
count de Clermont was also completely armed, mounted on his
charger covered with housings of his livery, as were his pages.
The lord de Culant, grand master of the king's household, (having
the command of a battalion of six hundred lances, each having a
pennoncel of crimson satin with a golden sun in the center,) followed
the pages of the king, in complete armour, a hat on his head, and
mounted on a charger covered with a housing of blue and red velvet
in stripes, each stripe having a large golden or silver leaf: the
armour of his horse was similarly ornamented. He wore round his
neck a baldrick of pure gold, that hung down below the crupper of
his horse. With the lord de Culant was an esquire called Rogerin
Blosset, equerry of the stables to the king, who bore the royal
standard of crimson satin, having the figure of St Michael in the
center, and besprinkled with leaves of gold.
Jean de Scaenville was also in the rear of the king: he was
surnamed Havart, bailiff of Dreux and esquire-carver to the king,
and bore the royal pennon, which was of azure velvet, with three
flowers de luce embroidered thereon in gold, and the border of this
pennon was of large pearls.
In their attendance on the king were numbers of great lords, such as
the viscount de Lomagne, the count de Castres, Ferry lord of
Lorraine, sir John his brother, the lord d'Orval, the count de
Tancarville, the lord de Montgascon, son to the count de Boulogne
and Auvergne, the lord de Jalognes marshal of France, the lord de
Beauveau, and more than I can remember, all clad in complete
armour, and their horses covered with housings of velvet or satin,
having on each a white cross.
Thus did the king advance until he came within bow-shot of the
beauvoisine gate, near to the carthusian convent, where the count
de Dunois, his lieutenant-general, came out to meet him, mounted
on a charger covered with crimson velvet, and himself dressed in a
crimson-velvet jacket trimmed with sables: he was girt with a
magnificent sword, whose pummel was set with diamonds, pearls
and rubies, to the Value of fifteen thousand crowns. The seneschal
of Poitou, and Jacques Coeur, master of the king's wardrobe,
attended him mounted on chargers covered and clad like to the
lieutenant-general. The bailiff of Evreux and sir William Cousinot
were also there,—the first mounted on a charger covered with
crimson velvet, and himself clad in the same stuff. Sir William
Cousinot had lately been nominated bailiff of Rouen, and was
dressed in blue velvet with rich clasps of silver gilt: his horse had
housings of the same.
The lieutenant-general had brought from the town, to do reverence
to the king, the archbishop of Rouen, the bishops of Lisieux, Bayeux,
and Coutances, and the principal inhabitants. When these prelates
had done their obeisance, they returned into the town, leaving the
citizens, who were very numerous, clad in blue with red hoods, with
the lieutenant, who presented them to the king. After paying their
humble reverence, they delivered the keys of their town into the
hands of the king, as their sovereign lord; and after many fine
speeches from them, which he heard with kindness, he gave the
keys to the before-mentioned seneschal, appointing him governor of
the place.
The king then began his entrance into the city in the same order as I
have described; but the moment he began to move a procession of
prelates and churchmen, in their pontifical habits, regulars and
seculars, bearing jewels and relics, and accompanied by the four
mendicant orders, came out to meet him, singing 'Te Deum
laudamus,' for the joyful arrival of the king of France, their sovereign
lord. They placed themselves before the chancellor of France, the
lord de la Fayette marshal of France, the lord de Gaucourt first
chamberlain to the king, the lord de Presseigny, and Jacques Coeur,
who all had their horses covered with velvet and satin, and had
jackets of the same with white crosses. The count de Dunois placed
himself directly before the king, near to the equerry of the stables.
It is certain, that in the memory of man, never was king seen with
such a handsome body of chivalry, so finely dressed, nor so great a
number of men at arms as the king of France had with him on his
regaining his good city of Rouen. At the entrance of the gates, a
youth, aged about twelve or thirteen years, and son to the lord de
Presseigny, was knighted by the seneschal of Poitou. At the gate of
the bulwark were four of the most distinguished of the citizens with
an exceedingly rich canopy, which they held over the head of the
king until he came to the church of our Lady in Rouen. All round this
gate, and on the bulwark, were immense crowds of people, who, on
the king's entrance in the midst of his men at arms, sang carols for
joy at the happy event. In all the squares were different pageants: in
one was a fountain ornamented with the arms of the town, namely,
a lamb, who spouted out liquors from his horns. Elsewhere was a
tyger with its young ones, who were admiring themselves in looking
glasses; and near to the church of our Lady was a flying stag,
sumptuously made, having on his neck a crown,—and he kneeled
down, by way of reverence to the king as he passed on his way to
the church.
At this place were the count de Dunois with lord Talbot and the
english hostages at a window to see the pageant: the last were very
pensive, and hurt at heart, on witnessing a sight so disagreeable to
their interests. The king dismounted on his arrival before the church,
where he was received by the archbishop and his clergy, richly
dressed in their copes. Having entered the church, he continued
some time in prayer, and thence went to the palace of the
archbishop, where he was lodged.
Every one now returned to their homes,—and the populace made
great bonfires in all the streets, to testify their joy on the occasion.
The archbishop, on the morrow, led several solemn processions,—
and the day was kept sacred from all labour and work, the same as
if it had been Sunday. On the Wednesday and Thursday, the
rejoicings were continued, and tables were spread in the street,
covered with meats and wines for all comers, at the expense of the
inhabitants. They also made rich presents to the king, his officers,
his heralds and pursuivants, then present. While the king remained
at the archbishop's palace, the churchmen, citizens and inhabitants,
required an audience of him, touching certain requests they had to
make. On its being granted, they entered the great hall, where the
king was seated on his throne richly adorned, and himself dressed in
cloth of gold, surrounded by his ministers. They proposed various
measures to him, and, in the number, most humbly supplicated that
he would be graciously pleased to pursue his ancient enemies the
English; for by means of the towns they yet possessed in Normandy
they were still enabled to do great mischiefs to the country. To assist
him in this measure, they offered their lives and fortunes.
The king was well pleased with their proposal, more particularly with
their offers of service and of money, and made, by means of the
chancellor, a satisfactory answer to all they had proposed. They then
took their leave, and retired to their homes. The king staid some
time in Rouen to remodel the government of it; during which the
English surrendered all the places they had given hostages for
namely, the castle of Arques, Tancarville, Lillebonne, Monstierville[59]
and Caudebec. But although they had engaged to restore Honfleur, it
was not done, because the governor refused to obey, in this point,
the orders of the duke of Somerset, and, consequently, the lord
Talbot with the other hostages remained prisoners to the king of
France. Sir Pierre de Brézé, seneschal of Poitou, was appointed
governor of Rouen.

FOOTNOTES:
[58] Fonteville. Fontenay.——MS. Du Cange.
[59] Monstierville—should be Montivilliers, a town in Normandy,
three leagues from Havre, eight from Fecamp.
CHAP. XV.
THE CASTLE OF GAILLON SUBMITS TO THE OBEDIENCE
OF THE KING OF FRANCE.—FOUGERES SURRENDERS TO
THE DUKE OF BRITTANY, AND BELLÊME[60] TO THE DUKE
OF ALENÇON.—A WELL-FOUGHT BATTLE TAKES PLACE
BETWEEN THE FRENCH AND ENGLISH.
On the 23d of November, in this year, the impregnable castle of
Gaillon surrendered to the king's forces, after a siege of six weeks.
The english garrison amounted to from one hundred to six score,
and marched away on capitulation, to carry with them their effects
to Harfleur, or to any other place under their subjection.
About the same time, the duke of Brittany gained the town and
castle of Fougeres, after a siege of a month. He had battered the
walls with his cannons and bombards so that the breaches were
nearly wide enough to storm, when the English, seeing their danger,
and knowing their provisions were expended, surrendered on
capitulation. Their captain was sir Francis de Surienne, called the
Arragonian, having under his command from five to six hundred
men,—and they were allowed to march away with their horses and
arms, but each with only a small bundle before him. This sir Francis
afterwards turned to the French, and took the oaths of allegiance to
the king, notwithstanding that he had taken the town of Fougeres
from the duke of Brittany, and thus had broken the truce between
the kings of France and England.
The duke of Brittany had, at that time, in his army, eight thousand
combatants, lords, knights and esquires; but after the surrender of
Fougeres they returned home, on account of the great mortality in
the army, which carried off very great numbers, and among the rest
the son of the viscount de Rohan, which was a great pity. The duke
went also into Brittany, after he had placed sufficient garrisons in his
conquests.
Toward the end of November, the duke of Alençon laid siege to his
town and castle of Bellême, then occupied by the English contrary to
his will. He had with him about three hundred lances, knights and
esquires, and a body of archers, without including the peasantry
from the countries of Maine and Vendôme, who were estimated at
three thousand fighting men. After several skirmishes and sallies,
the English, finding all resistance vain, entered on a treaty with the
duke, and engaged to surrender the town and castle on the 20th
day of December, unless their friends should appear on that day in
sufficient force to give the duke battle and conquer him.
The duke, therefore, intrenched his army on the plain to wait the
arrival of the English, who were on their march to relieve the place.
Two thousand of them had advanced to Torigny[61], and, on their
departure, had set it on fire, and proceeded to Thury[62], where they
received certain intelligence of the exact strength of the duke's army,
and in consequence marched back again. On the 20th day of
December, the duke of Alençon and the lord de Saintrailles drew
their army up in battle-array, and waited thus until the hour for the
appearance of the enemy was passed. The captain of the english
garrison in Bellême, called Matago[63], having about two hundred
combatants with him, then surrendered the place, and marched
away in safety with their effects, according to the terms of the
capitulation, whither they pleased.
About Christmas-day, the english garrison in Vire[64], to the number
of twelve score, marched out to seek adventures, but were met by a
party of the constable's men in garrison at Gourey[65], near to the
Croix de Vamoux, under the command of sir Geoffry de Couvran,
Joachim Rouhault, and others, when a very sharp engagement took
place,—but the English were discomfited, so many being killed or
taken that few escaped.
FOOTNOTES:
[60] Bellême,—a town in Perche, 10 leagues from Alençon.
[61] Torigny,—a small town in Normandy.
[62] Thury,—a small town in Normandy.
[63] Matago. Q. Matthew Gough?
[64] Vire,—on the river Vire in Normandy, diocese of Bayeux,
generality of Caen.
[65] Gourey. Q. if not Gournetz, a village in Normandy.
CHAP. XVI.
THE KING OF FRANCE LEAVES ROUEN.—HE SENDS HIS
LIEUTENANT-GENERAL TO BESIEGE HARFLEUR, WHICH
SURRENDERS ON CAPITULATION.—THE FAIR AGNES IS
TAKEN ILL.—HER DEATH, AND HER LAST TESTAMENT.
The king of France, having settled the government of Rouen to his
satisfaction, marched thence clothed in a brigandine, having over it a
jacket of gold tissue, accompanied by the king of Sicily, and the
other princes of his blood, magnificently dressed, more especially
the count de St Pol, whose horse's forehead-piece was valued at
thirty thousand francs.
Thus attended, the king rode to Caudebec,—in which town it was
resolved to lay siege to Harfleur; and in consequence, he advanced
to Montivilliers, which is but half a league distant from Harfleur, and
thence detached his lieutenant-general, the count de Dunois, to
open the trenches. The count had with him the counts d'Eu, de
Clermont, de Nevers, de Castres, with many men at arms, archers
and franc archers, so that his force was estimated at six thousand
men, without including the franc archers, who amounted to three
thousand, or the cannoneers, labourers, and followers, or the
mariners who blockaded the place with twenty-five large vessels, or
those who had besieged the abbey of Graville, amounting, in the
whole, to more than a thousand men.
The siege was commenced on the 8th day of December, with many
difficulties,—for there were neither houses nor trees near at hand,
and the weather was more severe, by reason of frosts and
inundations, than had been experienced for some time. The
besiegers suffered also greatly from the sea, which at times
destroyed their huts, which were composed only of earth covered
with juniper branches.
Sixteen large bombards were pointed against the walls, which the
king came frequently from Montivilliers to see fired. Deep trenches
of communication were formed, wherein the king often exposed his
person, armed only with a light helmet and covering shield, to
witness the effect of this battery against the walls. Covered trenches
were carried to the very walls of Harfleur; and these mines and
trenches were formed under the directions of master John Bureau,
treasurer to the king, in conjunction with his brother Jasper, grand
master of the royal artillery, both very expert and able in the
sciences.
Thomas Aurmagan[66], governor of Harfleur, and the English with
him, to the amount of sixteen hundred, receiving pay, witnessing the
great preparations of the king of France, opened a treaty with the
count de Dunois, on the eve of Christmas-day, for the surrender of
the place. On the morrow, the capitulation was signed,—and they
were to march away with their baggage, and were allowed to
transport their effects by land or sea, the term for so doing being
limited to the first day of the year. Eight english gentlemen were
given as hostages for the due performance of the treaty, who were
sent under an escort to Montivilliers. On the first day of January,
they were brought back to Harfleur, for the accomplishment of the
treaty. About vespers, Thomas Aurmagan, the governor, presented
the keys of the gates and towers to the count de Dunois, with much
reverence and kneeling, in the presence of all the English, and even
before master Sanice[67], who had brought a reinforcement of five
hundred English just before the siege.
The lieutenant-general, on receiving the keys, sent a party to take
possession of the towers, and to lower the english standard, of a red
cross on a white field, that was flying on one of them. He afterwards
ordered two heralds to replace it with the standard of France, which
was done with the shouts and rejoicings of the populace. The count
also posted a party of his men in the towers on the side toward
Rouen. This day, the greater part of the English departed; but as all
could not be ready by the return of the tide, the lieutenant-general
listened to their humble supplications, and permitted those who
remained to tarry there until the Friday and Saturday at midday, and
appointed a guard over them that they might not be ill treated.
When the English were all gone, the king gave the government of
Harfleur to the count de Dunois, who appointed the lord de Moy his
lieutenant, with one hundred lances and a proportionate number of
archers for its defence, and for that of the country around.
Jacques de Clermont, esquire, was made governor of Montivilliers,—
and he had likewise one hundred spears and archers for its guard,
and for the defence of other forts in the neighbourhood. The king,
having made these appointments, left Montivilliers on the 5th day of
January: he ordered detachments of his army to march through
Rouen, Caudebec and Tancarville, to besiege Honfleur, and went
himself to the abbey of Jamieges[68], on the Seine, five leagues
below Rouen, where he remained for some time, while preparations
were making for the siege of Honfleur.
At this abbey, the king met the fair Agnes, who had come thither (as
she said) to give the king information that some of his officers
intended to deliver him up to his enemies the English. The king,
however, paid no attention to the intelligence, but laughed at it. This
fair Agnes had been five years in the service of the queen, during
which she had enjoyed all the pleasures of life, in wearing rich
clothes, furred robes, golden chains, and precious stones; and it was
commonly reported that the king often visited her, and maintained
her in a state of concubinage,—for the people are more inclined to
speak ill than well of their superiors.
The affection the king showed her was as much for her gaiety of
temper, pleasing manners, and agreeable conversation, as for her
beauty. She was so beautiful that she was called the Fairest of the
Fair, and the Lady of Beauté, as well on account of her personal
charms as because the king had given her for life the castle of
Beauté, near Paris. She was very charitable, and most liberal in her
alms, which she distributed among such churches as were out of
repair, and to beggars.
It is true, that Agnes had a daughter, who lived but a short time,
which she said was the king's, and gave it to him as the proper
father: but the king always excused himself, as not having any claim
to it. She may indeed have called in help, for the matter was
variously talked of.
At length, she was seized with a bowel-complaint, and was a long
time ill,—during which, she was very contrite, and sincerely repented
of her sins. She often remembered Mary Magdalen, who had been a
great sinner, and devoutly invoked God and the virgin Mary to her
aid. Like a true catholic, after she had received the sacraments, she
called for her book of prayers, in which she had written with her own
hand the verses of St Bernard, to repeat them. She then made many
gifts (which were put down in writing, that her executors might fulfil
them, with the other articles of her will), which, including alms and
the payment of her servants, might amount to nearly sixty thousand
crowns. Her executors were Jacques Coeur, counsellor and master of
the wardrobe to the king, master Robert Poictevin, physician, and
master Stephen Chevalier, treasurer to the king, who was to take the
lead in the fulfilment of her will, should it be his gracious pleasure.
The fair Agnes, perceiving that she was daily growing weaker, said to
the lord de la Trimouille, the lady of the seneschal of Poitou, and one
of the king's equerries called Gouffier, in the presence of all her
damsels, that our fragile life was but a stinking ordure. She then
required that her confessor would give her absolution from all her
sins and wickedness, conformable to an absolution, which was, as
she said, at Loches, which the confessor, on her assurance, complied
with. After this, she uttered a loud shriek, and called on the mercy of
God, and the support of the blessed virgin Mary, and gave up the
ghost on Monday, the 9th day of February, in the year 1449, about
six o'clock in the afternoon. Her body was opened, and her heart
interred in the church of the said abbey, to which she had been a
most liberal benefactress; and her body was conveyed, with many
honours, to Loches, where it was interred in the collegiate church of
our Lady, to which also she had made many handsome donations,
and several foundations. May God have mercy on her soul, and
admit it into paradise![69]

FOOTNOTES:
[66] Thomas Aurmagan. Q.
[67] Master Sanice. Q.
[68] Jamieges,—a market-town on the Seine, two leagues from
Caudebec, six from Rouen.
[69] Agnes Sorel, says Moreri, was one of the handsomest
women of her time. She was a native of Promenteau, a village of
Touraine, in the diocese of Bourges. King Charles VII. no sooner
saw her than he fell in love with her. This prince made her great
presents, and gave her the castle of Beauté sur Marne. It is said
that his affection for her caused him to neglect public business,
but that Agnes contrived to excite him with such animosity
against the English that he exerted his utmost efforts to drive
them out of the kingdom. It is added, that she assured him that
an astrologer had foretold to her that she would captivate the
affections of the greatest king in the world, but that this
prediction had no reference to him, since he neglected to
establish his authority in a state which his enemies had usurped,
and that, in order to accomplish it, she would be obliged to repair
to the court of the king of England. These reproaches roused the
king from his lethargy,—and he took the field to gratify, at once,
his love and his ambition. On this subject it is also said, that
Francis I. being, one day in the house of the count d'Estampes,
who had been his governor, and who was then grand master of
France, he amused himself with looking into a port-folio which
was upon the dressing table of the countess, who was fond of
painting, and had drawn in it the portraits of divers illustrious
persons, and among others of Agnes Sorel. The king made
devices and verses for each of these portraits,—and under that of
the fair Agnes he wrote the following lines with his own hand.
CHAP. XVII.
THE COUNT DE FOIX RAISES A LARGE ARMY TO BESIEGE
THE CASTLE OF GUISCHEN.—THE ENGLISH ASSEMBLE TO
RAISE THE SIEGE, BUT ARE DEFEATED BY THE LORD DE
LAUTREC AND THE BASTARD DE FOIX.
About this period, the count de Foix raised a large army, and caused
the strong castle of Guischen, situated four leagues from Bayonne,
to be besieged by his brother, the lord de Lautrec, and the bastard
de Foix. The English, on hearing this, instantly took the field with
four thousand combatants, under the command of the constable of
Navarre. He had with him the mayor of Bayonne, George
Saltviton[70],
'Plus de loüange et d'honneur tu merites,
La cause étant de France recouvrer,
Que ce que peut dedans un cloitre ouvrer
Close nonnain, en bien devot hermite.'
and many other English, who, having embarked their stores on the
river that runs through Bayonne, to convey them near to this castle,
marched as close to the vessels as they could.
News of their intentions was carried to the besiegers, who marched
as secretly as possible to meet them, and made so sharp an attack
on the English that they were driven from their boats, and lost
twelve hundred of their men in killed and taken. When Saltviton
witnessed this defeat, fearing it was impossible to recover the boats,
he broke gallantly through the french army with only sixty lances,
and saved himself for the moment in one of the outworks of the
castle. Finding that he could not long maintain himself in his present
post, he marched away with his men, thinking to regain Bayonne;
but the bastard de Foix, knowing his departure, immediately pursued
him, and made him and the greater part of his men prisoners.
On the morrow, the castle surrendered, and all the country between
Dax and Bayonne,—in which were from fifteen to sixteen strong
places, that surrendered to the count de Foix. When these forts had
been sufficiently garrisoned, the count's army was marched home.
The siege of Honfleur was commenced with great courage on the
17th day of January, while the king remained at Jamieges, by his
lieutenant general, the count de Dunois, and the other lords before
named. The franc archers, who had been sent by these lords in
advance ten or twelve days before, to skirmish with the english
garrison of Honfleur, did their duty well.
When the blockade was completed, the king left Jamieges, and fixed
his quarters at the abbey of Grestain, two leagues from Honfleur. On
his arrival, the approaches and trenches were pushed forward with
vigour, and many cannons and bombards were pointed against the
walls, to the astonishment of those within the town.
The governor of the place was called master Courson[71], having a
garrison of three or four hundred English who exerted themselves
valiantly in their defence with cannons and other missile weapons.
By their means was killed a gallant Frenchman, named Regnault
William, le Bourgognon, then bailiff of Montargis, which was a great
loss. At length, the English were so overpowered by fear and want of
provision that they were constrained to demand a parley, to arrange
terms of capitulation; and they agreed to surrender the town and
castle on the 18th day of February, unless there should appear a
force sufficient to relieve them, by conquering the French, and gave
hostages for its due performance, on which they were to march
away with their effects in safety.
The French now fortified their camp, and made preparations for a
combat, but the English did not appear; for the duke of Somerset
dared not leave Caen ungarrisoned, and, besides, they were not
strong enough to expect success without great reinforcements from
England. The place was therefore surrendered according to the
terms of the capitulation, and the English marched to other parts
under their obedience.
Soon after the reduction of Honfleur, the king left the abbey of
Grestain, and went to Berucy[72], and thence to Essay[73] and
Alençon. He ordered a party of his guards, with the franc archers, to
lay siege to Fresnay[74], which was under the government of two
Englishmen, called Andrew Torfflot[75] and Janequin Vaquier[76],
having with them from four to five hundred English and Normans,
called French Renegadoes. The French advanced before the place in
a numerous body, in handsome array, which so much alarmed the
governors that they instantly offered to treat for a surrender. After a
short discussion, it was agreed, that on the place being given up to
the king of France, together with ten thousand golden saluts, their
captain, called Montfort[77], who had been made prisoner at Pont
Audemer, should be restored to them, and they should be allowed to
march away in safety with their baggage. Thus was the place
surrendered,—and the English departed, on the 22d day of March,
for Caen or Falaise, or to wherever else they pleased.
During the time of Lent, in this year, three thousand English landed
at Cherbourg, under the command of sir Thomas Kiriel, a knight of
great experience and renown, and marched to lay siege to
Valognes[78], which was under the government of an esquire from
Poitou, called Abel Rohault. He held it valiantly for some time, for his
brother Joachim Rohault; but having no hope of succour, he was
forced to surrender it to sir Thomas Kiriel, after a defence of three
weeks, and was allowed to march his men away in safety with all
they possessed.
The king's army was, at the time, collecting to raise the siege; as
were the English to oppose them, from their different garrisons,—
namely, sir Robert Vere, in Caen, had six hundred combatants,—
Henry Morbery, in Vire, had about four hundred,—Matago, in the
town of Bayeux, had eight hundred fighting men,—so that they
amounted in all, including sir Thomas Kiriel's force, to six or seven
thousand combatants. The French, learning this, suffered the town
to be surrendered without any attempt to the contrary,—for they
could not be assembled in time, considering that the king's army
was then dispersed in cantonments throughout Normandy, for the
better preservation of their conquests.

FOOTNOTES:
[70] Saltviton. In the MS. of Du Cange, it is Soliton; but this
seems as far from the true name as the other.
[71] Courson. Q. Curzon?
[72] Berucy,—Bernay, a market-town in Normandy, twenty
leagues and a half from Alençon. MS. Du Cange.
[73] Essay,—a market-town in Normandy, five leagues from
Alençon.
[74] Fresnay. There are two villages of this name in Normandy.
[75] Andrew Torfflot. Troslo.——MS. Du Cange. Q. if not Truslow?
[76] Janequin Vaquier. Basquier and Baquier.——MS. Du Cange.
[77] Montfort. Q. if not lord Fauconberg? See in the preceding
pages.
[78] Valognes,—five leagues from Cherbourg.
[a.d. 1450.]
CHAP. XVIII.
AFTER THE CAPTURE OF VALOGNES BY SIR THOMAS
KIRIEL, HE TAKES THE FIELD WITH A LARGE ARMY OF
ENGLISHMEN.—HE IS MET BY THE COUNT DE
CLERMONT, WHO ATTACKS AND DEFEATS HIM.
On the 12th day of April, in the year 1450, after Easter, sir Thomas
Kiriel dislodged from Valognes, having with him the greater part of
the garrisons of Caen, Bayeux, and Vire, and, crossing the fords of
St Clement[79], advanced toward the country of Bayeux and Caen.
Intelligence of this movement was carried to the french
headquarters, and a detachment was ordered to pursue them, under
the command of the count de Clermont, the count de Castres, the
seneschal of Poitou, the lord de Montgascon and de Retz, admiral of
France, and others, to the amount of five or six hundred spears and
archers. Although they were so few in numbers, they continued their
pursuit until they overtook them. Sir Geoffry de Couvran and
Joachim Rohault had, some little time before, separated from them
to seek if they could gain any information of the enemy, and luckily
fell in with their track. Notwithstanding the disparity of numbers,
they boldly and courageously made an attack on their rear-guard,
and killed and wounded several. They then retreated, and sent
notice of what they had done to the count de Clermont, who was
not far off. He hastened to come up with the English, which he did
near a village called Fourmigny, between Carentan and Bayeux, on
the 13th of the same month.
The English, on perceiving the enemy, drew up in battle-array, and
sent in haste to a captain, called Matago, who had that morning
quitted them for Bayeux, but instantly returned to the aid of his
companions.
The two armies remained drawn up facing each other for three
hours, while a continual skirmish was going forward,—during which,
the English made, with their swords and daggers, deep holes in their
front, that those who should charge them might fall in with their
horses: they were also very advantageously posted, for they had,
within a bow-shot of their rear, a small river with gardens and
orchards thick planted with fruit-trees, so that they could not be
attacked on that quarter.
The count de Clermont, observing their situation, and considering
that he had not an adequate force to combat them, dispatched a
messenger in haste to St Lo, to require that the count de Richemont,
constable of France, would come to his succour,—otherwise he and
his men would have more work on their hands than they could
accomplish, for that the English greatly outnumbered his force.
The constable, on receiving this intelligence, instantly set out, at
three o'clock in the morning of the same day, the 18th, to his
assistance, although he was but just arrived from Brittany without
halting. He rode to Trevieres[80], accompanied by the lord James de
Luxembourg, the count de Laval, the lord marshal de Lohéac, and
from two hundred to twelve score lances and eight hundred archers.
They advanced with great rapidity (for the English had already
crossed the ford) until they came to the windmill above Fourmigny,
where they drew up in order of battle in sight of the English.
The count de Clermont had begun the engagement with his army of
a thousand to fifteen hundred men before the arrival of the
constable, and had been sharply repulsed by the English, who had
taken from them two culverines. The constable first marched his
men to gain a stone bridge,—but no sooner did Matago and sir
Robert Vere perceive this manœuvre of the constable than they fled
with a thousand of their men from Caen and Bayeux. Kiriel and the
remainder retreated toward the rivulet, and occupied the village that
was hard by.
Part of the constable's archers, having dismounted at the end of the
bridge, attacked the left wing of the English,—and many were killed
and put to the rout. The constable now crossed the rivulet and
joined the count de Clermont; when the grand seneschal of
Normandy asked his permission to march his division toward the
enemy's right wing, which being granted, the English were slain and
defeated. The main body of the constable's men marched now in
handsome order until they were near the village, and crossed the
brook by the high road. The English were so much alarmed that they
quitted the village, and advanced to the rivulet, where a well-fought
engagement took place; but although the French were in all not
more, according to the report of the heralds, than three thousand
combatants, and the English from six to seven thousand,
nevertheless, by the grace of God, the French defeated them. From
the accounts of the heralds, priests, and credible persons, three
thousand seven hundred and seventy-three were slain, and buried in
fourteen deep trenches on the spot.
Among the prisoners were sir Anthony[81] Kiriel, sir Henry
Norbery[82], sir Thomas Drieut[83], Thomas Kirby, Christopher
Auberton, Arpel, Helix Alengour, Jannequin Vacquier, Gobert
Caleville, and numbers of other captains, and english gentlemen
bearing coats of arms. Conformably to the old proverb, of 'He who
fights and runs away, may live to fight another day,' did those act
who fled and left their companions to bear the brunt of the battle,
namely, Matago, sir Robert Vere, Henry Lons, master Meillan, and
another captain who commanded thirty lances and five hundred
archers. The prisoners taken at this battle were estimated at from
twelve to fourteen hundred. Matago fled to Bayeux, and sir Robert
to Caen,—and thus, by the favour of Divine Providence, were the
English defeated.
On this day, the following were made knights: the count de Castres,
son to the count de la Marche,—Godfrey de Boulogne, son to the
count de Boulogne and Auvergne,—the lord de Vauvert, son to the
count de Villars, the lord de St Severe, the lord de Chalençon, and

You might also like