CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [315]
and privacy expectations
transfers and access rights
Encapsulating Security Payload (ESP)
encapsulation
encryption. See also cryptography
asymmetric algorithms
authentication
of folders with cipher, lab
in Linux, lab
origins of standards
symmetric algorithms
weakest link
of Windows account database, lab
of Windows file, lab
end-entity certificate
End User License Agreements (EULAs)
and selling old computers
enticement
entrapment
environment, scanning
erasing files, on computer system
escalation
escalation auditing
ESP (Encapsulating Security Payload)
ethical hacking
ethics policies
EULAs (End User License Agreements)
and selling old computers
European Institute for Computer Anti-Virus Research
European Union (EU), cyber laws
Evaluation Assurance Levels (EALs)
evaluation versions of software
Event Viewer
Security Log object
events
as incident
locating in Windows XP, lab
exam essentials
attack strategies
cryptography
hardening
information security
infrastructure
intrusion detection systems (IDSs)
physical security
policies and procedures
security management
exception statement, in policy
.exe file extension
expiration of key
extended warranty agreement
Extensible Authentication Protocol (EAP)
Extensible Markup Language (XML)
external security threats
extranets
extrusion
F
fail-over
failed login attempts, viewing in Linux, lab
faillog utility
false positives
from IDSs
Family Education Rights and Privacy Act
Faraday cage
FAT (File Allocation Table)
fault tolerance
Federal Information Processing Standard (FIPS)
Fedora, SELinux configuration in, lab
FHSS (frequency-hopping spread spectrum)
fiber-optic technology
networks
fiber splitter
File Allocation Table (FAT)
file exchange systems
file extensions
and attacks
hiding
making visible in Windows XP, lab
file names.3 convention
file servers, hardening
file sharing
in FTP
troubleshooting
file structure, in Unix
File Transfer Protocol (FTP)
hardening servers
ports
security risks
files, disappearance of
files in Linux
changing access control list, lab
changing group, lab
changing permissions, lab
default permissions for new, lab
hiding, lab
files in Windows
displaying Security tab for, lab
encryption, lab
viewing effective permissions, lab
filesystems, hardening
filters, to limit web traffic
Financial Modernization Act
fingerprint reader
FIPS (Federal Information Processing Standard)
fire corridors
fire detectors
fire extinguishers
fire-rated storage
fire suppression
Firefox
clearing private data, lab
firewalls
configuring
for DMZ
and IDS
IDS location based on
log files
NAT as
packet filter
proxy
stateful inspection
in Windows XP, lab
firmware
first-party cookies, lab
first responders
FISK program
five nines availability
fixed systems for fire suppression
Flash
flash cards
flaw-exploitation DoS attacks
flood attack, IDS active response to
flooding channel
floppy disks
Folder Options dialog box (Windows), View tab
folders
encryption with cipher, lab
preventing sharing, lab
footprinting
forensics
fraud
freeware
frequencies
frequency analysis, for code breaking
frequency-hopping spread spectrum (FHSS)
FTP (File Transfer Protocol)
hardening servers
ports
security risks
Full Archival backup method
full backup
full distribution information
G
gap in the WAP
gas-based fire-suppression systems
GET command (FTP)
Global Information Assurance Certification (GIAC)
Global System for Mobile Communications (GSM)
GNU software
goals, of information security
Good Time virus
Googlebot
government
agencies role in cryptography standards
archival requirements
classification of information
Gramm-Leach-Bliley