Online Book Reader

Home Category

CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [316]

By Root 3331 0
Act of 1999

Grandfather-Father-Son backup method

grep

group policies

to lock configuration settings

groups

changing association for file, lab

GroupWise

GSM (Global System for Mobile Communications)

Guest account, turning off in Windows XP, lab

guidelines

H

Hacken9

hacking, international laws in

hand scanners

hard drives

hardening

Apple Macintosh

applications

DHCP services

DNS servers

e-mail servers

file and print servers

FTP servers

NNTP servers

web servers

exam essentials

filesystems

network devices

Novell NetWare

operating systems

review questions

troubleshooting

Unix/Linux

Windows 2000

Windows Server 2003

Windows Vista

Windows XP

hardware-based keystroke loggers

hash total

hash value

creating rule, lab

hashing

science of

hashing algorithm

Health Insurance Portability and Accountability Act (HIPAA)

Heisenberg, Werner

Heisenberg Uncertainty Principle

hiding

files in Linux, lab

IP addresses

Windows shares, lab

hierarchical trust models for PKI

high availability

fault tolerance

formulating

RAID

redundancy

HIPAA (Health Insurance Portability and Accountability Act)

hiring policies

.hlp file extension

hoaxes, identifying

Homeland Security Act of 2002, Section

honeyd

Honeynet Project

honeypot

troubleshooting

host

host-based intrusion detection systems (HIDSs)

Host-to-Host (Transport) layer

hostnames, resolving to IP addresses

hot site

hotfixes

HTML (Hypertext Markup Language)

HTTP (Hypertext Transfer Protocol)

port

HTTPS (Hypertext Transport Protocol Secure)

port

hubs

attaching N-IDS to network

human error, and encryption vulnerabilities

human resource policies

acceptable use policy

background investigations

ethics policies

hiring policies

need-to-know policies

privacy policies

termination policies

human vulnerabilities

humidity control

hushmail.com

hybrid attacks

hybrid physical cryptography systems

hybrid trust models for PKI

Hypertext Markup Language (HTML)

Hypertext Transfer Protocol (HTTP)

port

Hypertext Transport Protocol Secure (HTTPS)

port

I

IANA (Internet Assigned Numbers Authority)

ICMP (Internet Control Message Protocol)

disabling traffic

packets

tunneling

IDEA (International Data Encryption Algorithm)

identification and authentication (I & A)

identity proofing

identity theft

IDPS

IDSs (intrusion detection systems)

active response

components

exam essentials

host-based

network-based

passive response

review questions

troubleshooting

IEEE (Institute of Electrical and Electronics Engineers)

802.1x protocols

802.11x wireless protocols

IETF (Internet Engineering Task Force)

IGMP (Internet Group Management Protocol)

IIS. See Internet Information Services (IIS)

IIS (Internet Information Services)

default mail system in early versions

security patches

IM (instant messaging)

attacks by

privacy

vulnerabilities

IMAP (Internet Message Access Protocol)

port

impersonation

to gain access

implicit denies

incident response

adjusting procedures

cycle

damage repair

documenting and reporting

identification

investigation

plan functioning

troubleshooting

incident response plan (IRP)

incident response policies

incidents

detection

incremental backup

inductive pickup

industry associations

info utility

information

access control

classifying

full distribution information

government and military

internal information

limited distribution information

private information

public information

restricted information

social engineering to obtain

information classification policies

drafting and documentation

information destruction policies, drafting and documentation

Information Flow model of information access

information integrity

Biba model

Return Main Page Previous Page Next Page

®Online Book Reader