Online Book Reader

Home Category

CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [320]

By Root 3036 0

configuring local security, lab

defaults for new users, lab

firewalls, lab

as Kerberos client, lab

as LDAP client, lab

screensaver password for, lab

turning off IPv6, lab

view logged warnings, lab

operating systems

bootable portable

hardening

security limitations

updates

operational considerations, in guidelines document

operational environment, survey of

operational security

issues

operator

orphanware

orthogonal frequency division multiplexing (OFDM)

OS X

out-of-band method to send key

Outlook, and virus spread

Outlook Express, and virus spread

OVAL (Open Vulnerability and Assessment Language)

overload, from manual network monitoring

overview statement, in policy

owner of data

P

packet-capture device

packet filter firewalls

packet sniffing

parental controls, applying to accounts

parity information

partitioning network

Password Authentication Protocol (PAP)

password crackers

password expiration policy

password-guessing attacks

password utility

passwords. See also username/password

access to

BIOS-based

changing default

changing minimum age in Windows XP, lab

encryption for Macintosh

external requirements for

for FTP

in Linux, lab

policies

for smart cards

on sticky notes

troubleshooting

U.S. Air Force security audit on

for Windows XP screensaver, lab

PAT (Port Address Translation)

patches

to close backdoors

for Linux, lab

in Unix/Linux

PATRIOT act

PBX (Private Branch Exchange) system

attack

.pdf file extension

PDF file of book

peer-to-peer connection

penetration

detection

testing

performance

criteria in standards statement

virus impact

performance baseline

Performance Monitor

lab

perimeter security

permissions

changing on all files in Linux directory, lab

viewing effective in Windows XP, lab

personal development

personal lab environment

Personally Identifiable Information (PII)

personnel management

PGP (Pretty Good Privacy)

phage virus

phishing

configuring filter in Internet Explorer, lab

physical access control policies

physical barriers

physical cryptography

hybrid systems

steganography

substitution ciphers

transposition ciphers

physical environment, survey of

physical security

access control

location of computers

partitioning

perimeter security

physical barriers

security zones

three-layer security model

biometrics

exam essentials

review questions

troubleshooting

physical token, for access

.pif file extension

PII (Personally Identifiable Information)

PIN, for smart cards

ping

ping of death

PKC (Public Key Cryptography)

PKCS (Public-Key Cryptography Standards)

PKI. See Public Key Infrastructure (PKI)

Plain Old Telephone Service (POTS)

platform hardening

plumbing

Point-to-Point Protocol (PPP)

remote access with

Point-to-Point Tunneling Protocol (PPTP)

policies and procedures. See also best practices; security policies

administrative

assembling and examining

business policies

document disposal and destruction policies

due care policies

physical access control policies

separation of duties

certificate policies

enforcement

exam essentials

human resource policies

acceptable use policy

background investigations

ethics policies

hiring policies

need-to-know policies

privacy policies

termination policies

implementing

incident response policies

information

review questions

updates

usage

user management

polymorphic virus

POP (Post Office Protocol)

port

popunders

popup blocker, Internet Explorer settings, lab

popup blockers

popups, vulnerabilities of

Port Address Translation (PAT)

port mirroring

port scan

to reveal Trojan horse

ports

checking available on system

packet filtering based on

security with hubs

viewing active, lab

and vulnerability

well-known

Return Main Page Previous Page Next Page

®Online Book Reader