CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [320]
configuring local security, lab
defaults for new users, lab
firewalls, lab
as Kerberos client, lab
as LDAP client, lab
screensaver password for, lab
turning off IPv6, lab
view logged warnings, lab
operating systems
bootable portable
hardening
security limitations
updates
operational considerations, in guidelines document
operational environment, survey of
operational security
issues
operator
orphanware
orthogonal frequency division multiplexing (OFDM)
OS X
out-of-band method to send key
Outlook, and virus spread
Outlook Express, and virus spread
OVAL (Open Vulnerability and Assessment Language)
overload, from manual network monitoring
overview statement, in policy
owner of data
P
packet-capture device
packet filter firewalls
packet sniffing
parental controls, applying to accounts
parity information
partitioning network
Password Authentication Protocol (PAP)
password crackers
password expiration policy
password-guessing attacks
password utility
passwords. See also username/password
access to
BIOS-based
changing default
changing minimum age in Windows XP, lab
encryption for Macintosh
external requirements for
for FTP
in Linux, lab
policies
for smart cards
on sticky notes
troubleshooting
U.S. Air Force security audit on
for Windows XP screensaver, lab
PAT (Port Address Translation)
patches
to close backdoors
for Linux, lab
in Unix/Linux
PATRIOT act
PBX (Private Branch Exchange) system
attack
.pdf file extension
PDF file of book
peer-to-peer connection
penetration
detection
testing
performance
criteria in standards statement
virus impact
performance baseline
Performance Monitor
lab
perimeter security
permissions
changing on all files in Linux directory, lab
viewing effective in Windows XP, lab
personal development
personal lab environment
Personally Identifiable Information (PII)
personnel management
PGP (Pretty Good Privacy)
phage virus
phishing
configuring filter in Internet Explorer, lab
physical access control policies
physical barriers
physical cryptography
hybrid systems
steganography
substitution ciphers
transposition ciphers
physical environment, survey of
physical security
access control
location of computers
partitioning
perimeter security
physical barriers
security zones
three-layer security model
biometrics
exam essentials
review questions
troubleshooting
physical token, for access
.pif file extension
PII (Personally Identifiable Information)
PIN, for smart cards
ping
ping of death
PKC (Public Key Cryptography)
PKCS (Public-Key Cryptography Standards)
PKI. See Public Key Infrastructure (PKI)
Plain Old Telephone Service (POTS)
platform hardening
plumbing
Point-to-Point Protocol (PPP)
remote access with
Point-to-Point Tunneling Protocol (PPTP)
policies and procedures. See also best practices; security policies
administrative
assembling and examining
business policies
document disposal and destruction policies
due care policies
physical access control policies
separation of duties
certificate policies
enforcement
exam essentials
human resource policies
acceptable use policy
background investigations
ethics policies
hiring policies
need-to-know policies
privacy policies
termination policies
implementing
incident response policies
information
review questions
updates
usage
user management
polymorphic virus
POP (Post Office Protocol)
port
popunders
popup blocker, Internet Explorer settings, lab
popup blockers
popups, vulnerabilities of
Port Address Translation (PAT)
port mirroring
port scan
to reveal Trojan horse
ports
checking available on system
packet filtering based on
security with hubs
viewing active, lab
and vulnerability
well-known