Online Book Reader

Home Category

CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [287]

By Root 3129 0
and you have other programs running that are affecting the installation of a program or how it runs. If you get an error message such as “Not enough memory” or “Setup cannot continue,” try one or more of the following suggestions and then try using the software again:

Turn off any antivirus software running on your computer. Installation programs sometimes mimic virus activity and may make your computer incorrectly believe that it’s being infected by a virus.

Close all running programs. The more programs you have running, the less memory is available to other programs. Installation programs typically update files and programs, so if you keep other programs running, installation may not work properly.

Have your local computer store add more RAM to your computer. This is, admittedly, a drastic and somewhat expensive step. However, adding more memory can really help the speed of your computer and allow more programs to run at the same time.

Customer Care

If you have trouble with the book’s companion CD-ROM, please call the Wiley Product Technical Support phone number at (800) 762-2974. Outside the United States, call +1 (317) 572-3994. You can also contact Wiley Product Technical Support at http://sybex.custhelp.com. John Wiley & Sons will provide technical support only for installation and other general quality-control items. For technical support on the applications themselves, consult the program’s vendor or author.

To place additional orders or to request information about other Wiley products, please call (877) 762-2974.

Glossary

3DES Also known as Triple Digital Encryption Standard (DES). A block cipher algorithm used for encryption.

802.11 See IEEE 802.11 Wireless LAN.

802.11a The standard that provides for bandwidths of up to 54Mbps in the 5GHz frequency spectrum.

802.11b The standard that provides for bandwidths of up to 11Mbps in the 2.4GHz frequency spectrum. This standard is also called Wireless Fidelity (Wi-Fi) or 802.11 high rate.

802.11g The standard that provides for bandwidths of 20Mbps in the 2.4GHz frequency spectrum.

802.11n A proposed amendment to the 802.11 standard that provides for bandwidths of 74Mbps in the 2.4GHz and 5GHz frequency spectrums. The standard is expected to be released in 2009.

A

acceptable use policy Agreed-upon principles set forth by a company to govern how the employees of that company may use resources such as computers and Internet access.

access attack An attack aimed at gaining access to resources.

access control The means of giving or restricting user access to network resources. Access control is usually accomplished through the use of an access control list (ACL).

access control list (ACL) A table or data file that specifies whether a user or group has access to a specific resource on a computer or network.

access point (AP) The point at which access to a network is accomplished. This term is often used in relation to a wireless access point (WAP).

accountability Being responsible for an item. The administrator is often accountable for the network and the resources on it.

accounting The act of keeping track of activity. Most often, this term is used to refer to tracking users’ interactions with network resources via log files that are routinely scanned and checked.

ACK See acknowledgment (ACK).

acknowledgment (ACK) A message confirming that a data packet was received. Acknowledgment occurs at the Transport layer of the Open Systems Interconnection (OSI) and TCP/IP models.

ACL See access control list (ACL).

Active Directory The replacement for NT Directory Service (NTDS) that is included with Windows 2000/2003. It acts similarly to Novell Directory Services (NDS), which is now known as eDirectory in NetWare 6.x/OES because it’s a true X.500-based directory service.

active response A response generated in real time.

active sniffing Involves an attacker gaining access to a host in the network through a switch and logically disconnecting it from the network.

ActiveX A Microsoft technology that allows customized controls, icons,

Return Main Page Previous Page Next Page

®Online Book Reader