CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [325]
University of Maryland, A. James School of Engineering
Unix Filesystem
Unix/Linux. See also Linux
file structure in
hardening
Network File System (NFS)
as default file-sharing protocol
networking, lab
securing for interactive users
unshielded twisted pair (UTP)
common cable specifications
updates
network devices
operating systems
in Unix/Linux
upgrades, policies on
UPN (User Principal Name)
UPS (ninterruptible power supply)
uptime
usage auditing
usage policies
USB flash drives
policies on use
use policies, drafting and documentation
user access and rights review
user accounts, identifying those with administrator access in Windows XP, lab
user behavior modification
User Datagram Protocol (UDP)
well-known ports
user files
user management policies
drafting and documentation
user of data
User Principal Name (UPN)
username/password
authentication
policies
users
defaults for new, in open SUSE, lab
education
to prevent virus spread
on security issues
against social engineering
utilities
for Linux, help for
natural disaster impact
UTP (unshielded twisted pair)
common cable specifications
V
vacations, mandatory
validation of input, vulnerabilities of
vampire tap
/var/log/faillog file
/var/log/lastlog file
/var/log/messages file
/var/log/wtmp file
.vbs file extension
vendor support reinforcement
code escrow agreements
service-level agreement (SLA)
VeriSign
VeriSign/InterNic
virtual local area networks (VLAN)
Virtual Network Computing (VNC)
virtual private networks (VPNs)
IPSec for
troubleshooting security
tunnels as
virtualization
virus scanner, on e-mail servers
viruses
with CD-R
how they work
losses due to
present activity
in removable media
symptoms of infection
transmission in network
types
VLAN (virtual local area networks)
VMware Player
VNC (Virtual Network Computing)
Voice over IP (VoIP)
VPN. See virtual private networks (VPNs)
vulnerabilities
scans
testing
W
W3C (World Wide Web Consortium)
W32/Klez.mm virus
WAP (Wireless Application Protocol)
security levels
war driving
warm site
warranties
warscan
water
damage from
in fire-suppression system
watermarking, electronic
WDP (Wireless Datagram Protocol)
weak key attack
Web connections
security
vulnerabilities of add-ins
ActiveX
buffer overflow
Common Gateway Interface (CGI)
cookies
cross-site scripting (XSS)
input validation
Java applets
JavaScript
popups
signed applets
SMTP relay
web request, TCP connection process for
web servers, hardening
web structure
websites
for tracking security issues
well-known ports
WEP (Wired Equivalent Privacy)
wetware
whatis utility
whereis utility
white lists
whole disk encryption
Wi-Fi
Wi-Fi Alliance
Wi-Fi Protected Access (WPA)
changing to, lab
Wi-Fi Protected Access 2 (WPA2)
Wiley Tech Support
Windows
file encryption, lab
identifying running processes, lab
password cracking
preventing shared folders, lab
routing table, lab
Windows 2000, hardening
Windows Media Center
Windows Registry, lab
Windows Server 2003
Automated System Recovery, lab
hardening
hash rules, lab
security from administrator’s view
SSL in, lab
updating system, lab
Windows Server 2008, updating system, lab
Windows shares, hiding and accessing, lab
Windows Socket (WinSock)
Windows Vista, hardening
Windows XP
account database encryption, lab
adding legal notice to computer startup, lab
Automatic Updates, lab
booting to good configuration, lab
changing password minimum age, lab
changing to Wi-Fi-Protected Access (WPA), lab
displaying Security tab for files and folders, lab
firewall in, lab