Online Book Reader

Home Category

CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [323]

By Root 3200 0

Internet

intranets

technologies

Network Address Translation (NAT)

tunneling

virtual local area networks (VLAN)

virtualization

telephony issues

vulnerabilities

security triad

security zones

troubleshooting

SEI (Software Engineering Institute)

SELinux (Security Enhanced Linux)

configuring in Fedora, lab

selling old computers

and operating systems

sender, authenticating

sensitive but unclassified information

sensor

separation of duties

Sequenced Packet Exchange (SPX)

Serial Line Internet Protocol (SLIP)

servers

authentication

in WAP

as e-mail relay

hardening

implementing secure environment

security for

service-level agreement (SLA)

service packs (Microsoft)

services

enabling and disabling

removing unneeded

session hijacking attacks

sessions in web browser, clearing, lab

sessions, terminating

SET (Secure Electronic Transaction)

SFTP (Secure File Transfer Protocol)

SGID files, finding in Linux, lab

SHA (Secure Hash Algorithm)

shadow copies

Shamir, Adi

shared folders, preventing, lab

shared resources, and security risk

shareware software

sheep-dip system

shielded twisted pair (STP)

common cable specifications

shielding

shoulder surfing

SHTTP (Secure HTTP)

shunning, in IDS

signal analysis

signal intelligence

signature-based-detection IDS

signed applets, vulnerabilities of

SIM (Subscriber Identification Module)

Simple Mail Transfer Protocol (SMTP)

port

relay vulnerabilities

virus

Simple Network Management Protocol (SNMP)

single loss expectancy (SLE)

single sided certificates

single sign-on (SSO)

single-tier environment

site surveys

SLA (service-level agreement)

Slammer attack

Slapper attack

SLE (single loss expectancy)

SLIP (Serial Line Internet Protocol)

smart cards

individuals forgetting

for keys

SMTP (Simple Mail Transfer Protocol)

port

virus

vulnerabilities of relay

smurf attack

sniffers

10Base-T network with

SNMP (Simple Network Management Protocol)

snooping

snort

lab

social engineering

testing, lab

troubleshooting

sockets

software. See applications

Software Engineering Institute (SEI)

software exploitation attack

Sophos Anti-Virus

source code, conditions of release

source port

spam

ACL to control

spare parts

sPing

split generation system

split-system key generation

spoofing attacks

SPX (Sequenced Packet Exchange)

Spybot

spyware

Spyware Doctor

SQL (Structured Query Language)

SQL Server (Microsoft)

SSH (Secure Shell)

SSID broadcast

SSL (Secure Sockets Layer)

in Windows Server 2003, lab

SSO (single sign-on)

standards

state laws on computer crime

stateful inspection firewalls

stateful packet filtering

static electricity

preventing

stealth virus

steganography

storage. See removable media

storing keys

STP (shielded twisted pair)

common cable specifications

stream cipher

Structured Query Language (SQL)

Subscriber Identification Module (SIM)

subscriber, in transaction

substitution ciphers

SUID files, finding in Linux, lab

support packs (Novell)

surge protectors

surveillance systems

survey

of operational environment

of physical environment

of surroundings

SuSE Linux

backups in, lab

installing OpenLDAP, lab

suspending keys

switches

Sybex test engine

Symantec Corporation

symmetric algorithms

symmetric key

SysAdmin, Audit, Network, Security (SANS) certification

system architecture, drafting and documentation

System Configuration Utility (Windows), lab

system files, clearing infection from

system logs

reviewing

system vulnerabilities

Systems Monitor

T

T-connector (BNC)

TACACS (Terminal Access Controller Access Control System)

port

TACACS/+

tailgating

tap

tape

for backups

tar pit

Tavares, Stafford

TCP (Transmission Control Protocol)

attacks

Return Main Page Previous Page Next Page

®Online Book Reader