Online Book Reader

Home Category

CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [315]

By Root 3308 0
policies

and privacy expectations

transfers and access rights

Encapsulating Security Payload (ESP)

encapsulation

encryption. See also cryptography

asymmetric algorithms

authentication

of folders with cipher, lab

in Linux, lab

origins of standards

symmetric algorithms

weakest link

of Windows account database, lab

of Windows file, lab

end-entity certificate

End User License Agreements (EULAs)

and selling old computers

enticement

entrapment

environment, scanning

erasing files, on computer system

escalation

escalation auditing

ESP (Encapsulating Security Payload)

ethical hacking

ethics policies

EULAs (End User License Agreements)

and selling old computers

European Institute for Computer Anti-Virus Research

European Union (EU), cyber laws

Evaluation Assurance Levels (EALs)

evaluation versions of software

Event Viewer

Security Log object

events

as incident

locating in Windows XP, lab

exam essentials

attack strategies

cryptography

hardening

information security

infrastructure

intrusion detection systems (IDSs)

physical security

policies and procedures

security management

exception statement, in policy

.exe file extension

expiration of key

extended warranty agreement

Extensible Authentication Protocol (EAP)

Extensible Markup Language (XML)

external security threats

extranets

extrusion

F

fail-over

failed login attempts, viewing in Linux, lab

faillog utility

false positives

from IDSs

Family Education Rights and Privacy Act

Faraday cage

FAT (File Allocation Table)

fault tolerance

Federal Information Processing Standard (FIPS)

Fedora, SELinux configuration in, lab

FHSS (frequency-hopping spread spectrum)

fiber-optic technology

networks

fiber splitter

File Allocation Table (FAT)

file exchange systems

file extensions

and attacks

hiding

making visible in Windows XP, lab

file names.3 convention

file servers, hardening

file sharing

in FTP

troubleshooting

file structure, in Unix

File Transfer Protocol (FTP)

hardening servers

ports

security risks

files, disappearance of

files in Linux

changing access control list, lab

changing group, lab

changing permissions, lab

default permissions for new, lab

hiding, lab

files in Windows

displaying Security tab for, lab

encryption, lab

viewing effective permissions, lab

filesystems, hardening

filters, to limit web traffic

Financial Modernization Act

fingerprint reader

FIPS (Federal Information Processing Standard)

fire corridors

fire detectors

fire extinguishers

fire-rated storage

fire suppression

Firefox

clearing private data, lab

firewalls

configuring

for DMZ

and IDS

IDS location based on

log files

NAT as

packet filter

proxy

stateful inspection

in Windows XP, lab

firmware

first-party cookies, lab

first responders

FISK program

five nines availability

fixed systems for fire suppression

Flash

flash cards

flaw-exploitation DoS attacks

flood attack, IDS active response to

flooding channel

floppy disks

Folder Options dialog box (Windows), View tab

folders

encryption with cipher, lab

preventing sharing, lab

footprinting

forensics

fraud

freeware

frequencies

frequency analysis, for code breaking

frequency-hopping spread spectrum (FHSS)

FTP (File Transfer Protocol)

hardening servers

ports

security risks

Full Archival backup method

full backup

full distribution information

G

gap in the WAP

gas-based fire-suppression systems

GET command (FTP)

Global Information Assurance Certification (GIAC)

Global System for Mobile Communications (GSM)

GNU software

goals, of information security

Good Time virus

Googlebot

government

agencies role in cryptography standards

archival requirements

classification of information

Gramm-Leach-Bliley

Return Main Page Previous Page Next Page

®Online Book Reader