Online Book Reader

Home Category

CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [318]

By Root 3317 0
escrow

Key Exchange Algorithm (KEA)

key life cycle

key management. See also private key; public key infrastructure (PKI)

centralized vs. decentralized generation

destruction

expiration

key escrow

recovery and archiving

renewal

revocation

storage and distribution

suspension

troubleshooting

usage

keystroke loggers, hardware-based

Klez32 virus

L

L2F (Layer 2 Forwarding)

L2TP (Layer 2 Tunneling Protocol)

LANMAN protocol

passwords

last command

last known good configuration, booting to, lab

lastlog utility

lab

latency

law enforcement

key escrow for

rules of evidence

Layer 2 Forwarding (L2F)

Layer 2 Tunneling Protocol (L2TP)

LCP (Link Control Protocol)

LDAP (Lightweight Directory Access Protocol)

openSUSE as client, lab

port

leaf CA

leaf objects in NetWare

least privilege

legal notice, adding to computer startup, lab

license server

Lightweight Directory Access Protocol (LDAP)

openSUSE as client, lab

port

limited distribution information

Link Control Protocol (LCP)

Linux. See also Unix/Linux

changing ACL on all files in directory, lab

changing password, lab

changing permissions on all files in directory, lab

counting number of running processes, lab

default permissions for new files, lab

encryption in, lab

help for utilities

hiding file, lab

identifying running processes, lab

installing snort, lab

log files in

network traffic monitoring, lab

Novell product conversion to

rescue disk in, lab

resources in

routing table, lab

setup for lab exercises

updating system, lab

viewing failed login attempts, lab

viewing logins, lab

LinuxSecurity

Local Area Connection Properties dialog box, General tab

local policies

local registration authority (LRA)

locking down desktop

locks

logged warnings, viewing in openSUSE, lab

logging

in IDS

in Linux

logic bombs

logical tokens

login prompt, message display prior to accessing, lab

logins

viewing failed attempts in Linux, lab

viewing in Linux, lab

logon process

spoofing attacks as part of

logon spoofing

logs

and auditing

drafting and documentation

Event Viewer for reviewing

in Linux

reviewing

low-level format

LRA (local registration authority)

M

M of N Control method of access

MAC, various meanings of acronym

MAC (Mandatory Access Control) model

MAC (Media Access Control) address

MAC (message authentication code)

for verifying integrity

macro virus

Magic Lantern

maintenance contracts

maintenance requirements, in standards

malicious code, surviving

malicious events, preventing

malware

training users to avoid

man-in-the-middle attacks

man tool

Managed Security Service Provider (MSSP)

management

education on security issues

manager

Mandatory Access Control (MAC) model

mandatory vacations

mantrap

masquerading

mathematical attacks

mathematical cryptography

McAfee Corporation

MD (Message Digest Algorithm)

mean time between failure (MTBF)

mean time to repair (MTTR)

media

Media Access Control (MAC) address

Media Access layer

Melissa virus

memory dump, to obtain key

memory sticks

mesh trust models for PKI

message authentication code (MAC)

for verifying integrity

Message Digest Algorithm (MD)

metal oxide varistors (MOVs)

Microsoft

AntiSpyware

Baseline Security Analyzer, lab

Internet Information Services (IIS)

default mail system in early versions

security patches

Office, susceptibility to exploitation

protocols

SQL Server

Systems Management Server (SMS) package

TechNet website

website on security

Windows Group Policy FAQ

microwave systems

middletier server

military classification of information

MIME

minimum age of passwords, changing in Windows XP, lab

misuse-detection IDS

Mitnick, Kevin, Art of Deception: Controlling the Human Element of Security

mobile

Return Main Page Previous Page Next Page

®Online Book Reader