Online Book Reader

Home Category

CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [325]

By Root 3261 0
America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001

University of Maryland, A. James School of Engineering

Unix Filesystem

Unix/Linux. See also Linux

file structure in

hardening

Network File System (NFS)

as default file-sharing protocol

networking, lab

securing for interactive users

unshielded twisted pair (UTP)

common cable specifications

updates

network devices

operating systems

in Unix/Linux

upgrades, policies on

UPN (User Principal Name)

UPS (ninterruptible power supply)

uptime

usage auditing

usage policies

USB flash drives

policies on use

use policies, drafting and documentation

user access and rights review

user accounts, identifying those with administrator access in Windows XP, lab

user behavior modification

User Datagram Protocol (UDP)

well-known ports

user files

user management policies

drafting and documentation

user of data

User Principal Name (UPN)

username/password

authentication

policies

users

defaults for new, in open SUSE, lab

education

to prevent virus spread

on security issues

against social engineering

utilities

for Linux, help for

natural disaster impact

UTP (unshielded twisted pair)

common cable specifications

V

vacations, mandatory

validation of input, vulnerabilities of

vampire tap

/var/log/faillog file

/var/log/lastlog file

/var/log/messages file

/var/log/wtmp file

.vbs file extension

vendor support reinforcement

code escrow agreements

service-level agreement (SLA)

VeriSign

VeriSign/InterNic

virtual local area networks (VLAN)

Virtual Network Computing (VNC)

virtual private networks (VPNs)

IPSec for

troubleshooting security

tunnels as

virtualization

virus scanner, on e-mail servers

viruses

with CD-R

how they work

losses due to

present activity

in removable media

symptoms of infection

transmission in network

types

VLAN (virtual local area networks)

VMware Player

VNC (Virtual Network Computing)

Voice over IP (VoIP)

VPN. See virtual private networks (VPNs)

vulnerabilities

scans

testing

W

W3C (World Wide Web Consortium)

W32/Klez.mm virus

WAP (Wireless Application Protocol)

security levels

war driving

warm site

warranties

warscan

water

damage from

in fire-suppression system

watermarking, electronic

WDP (Wireless Datagram Protocol)

weak key attack

Web connections

security

vulnerabilities of add-ins

ActiveX

buffer overflow

Common Gateway Interface (CGI)

cookies

cross-site scripting (XSS)

input validation

Java applets

JavaScript

popups

signed applets

SMTP relay

web request, TCP connection process for

web servers, hardening

web structure

websites

for tracking security issues

well-known ports

WEP (Wired Equivalent Privacy)

wetware

whatis utility

whereis utility

white lists

whole disk encryption

Wi-Fi

Wi-Fi Alliance

Wi-Fi Protected Access (WPA)

changing to, lab

Wi-Fi Protected Access 2 (WPA2)

Wiley Tech Support

Windows

file encryption, lab

identifying running processes, lab

password cracking

preventing shared folders, lab

routing table, lab

Windows 2000, hardening

Windows Media Center

Windows Registry, lab

Windows Server 2003

Automated System Recovery, lab

hardening

hash rules, lab

security from administrator’s view

SSL in, lab

updating system, lab

Windows Server 2008, updating system, lab

Windows shares, hiding and accessing, lab

Windows Socket (WinSock)

Windows Vista, hardening

Windows XP

account database encryption, lab

adding legal notice to computer startup, lab

Automatic Updates, lab

booting to good configuration, lab

changing password minimum age, lab

changing to Wi-Fi-Protected Access (WPA), lab

displaying Security tab for files and folders, lab

firewall in, lab

Return Main Page Previous Page Next Page

®Online Book Reader