CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [326]
firewall log
folder encryption with cipher, lab
hardening
identifying user accounts with administrator access, lab
locating security events, lab
making file extensions visible, lab
network binding in
restore point, lab
screensaver password, lab
startup configuration, lab
turning off Guest account, lab
viewing effective permissions, lab
Windows XP Home edition
Windows XP Professional
WinSock (Windows Socket)
Wired Equivalent Privacy (WEP)
wireless access points
Wireless Application Protocol (WAP)
security levels
wireless cells
security for
Wireless Datagram Protocol (WDP)
Wireless Markup Language (WML)
wireless networks
troubleshooting security
vulnerabilities
wireless protocols
Wireless Session Protocol (WSP)
Wireless Transaction Protocol (WTP)
Wireless Transport Layer Security (WTLS)
Wireshark
wiring
coaxial
fiber-optic technology
unshielded twisted pair (UTP) and shielded twisted pair (STP)
WML (Wireless Markup Language)
WMLScript
work factor, of cryptography algorithm
working copy backups
working documents
workstations, security for
World Wide Web Consortium (W3C)
WORM (write once, read many) device
worms
WPA (Wi-Fi Protected Access)
WPA2 (Wi-Fi Protected Access 2)
write down, preventing
write-protected tape, and backup
WSP (Wireless Session Protocol)
WTLS (Wireless Transport Layer Security)
WTP (Wireless Transaction Protocol)
X
X.509 standard
certificate structure
XKMS (XML Key Management Specification)
.xls file extension
XML (Extensible Markup Language)
XML Key Management Specification (XKMS)
Y
YaST
yousendit.com
Z
ZENworks
Zimmerman, Phil
.zip file extension
zombies
Wiley Publishing, Inc. End-User License Agreement
READ THIS. You should carefully read these terms and conditions before opening the software packet(s) included with this book “Book”. This is a license agreement “Agreement” between you and Wiley Publishing, Inc. “WPI”.
By opening the accompanying software packet(s), you acknowledge that you have read and accept the following terms and conditions. If you do not agree and do not want to be bound by such terms and conditions, promptly return the Book and the unopened software packet(s) to the place you obtained them for a full refund.
1. License Grant. WPI grants to you (either an individual or entity) a nonexclusive license to use one copy of the enclosed software program(s) (collectively, the “Software,” solely for your own personal or business purposes on a single computer (whether a standard computer or a workstation component of a multi-user network). The Software is in use on a computer when it is loaded into temporary memory (RAM) or installed into permanent memory (hard disk, CD-ROM, or other storage device). WPI reserves all rights not expressly granted herein.
2. Ownership. WPI is the owner of all right, title, and interest, including copyright, in and to the compilation of the Software recorded on the physical packet included with this Book “Software Media”. Copyright to the individual programs recorded on the Software Media is owned by the author or other authorized copyright owner of each program. Ownership of the Software and all proprietary rights relating thereto remain with WPI and its licensers.
3. Restrictions On Use and Transfer.
a. You may only (i) make one copy of the Software for backup or archival purposes, or (ii) transfer the Software to a single hard disk, provided that you keep the original for backup or archival purposes. You may not (i) rent or lease the Software, (ii) copy or reproduce the Software through a LAN or other network system or through any computer subscriber system or bulletin-board system, or (iii) modify, adapt, or create derivative works based on the Software.
b. You may not reverse engineer, decompile, or disassemble the Software. You may transfer the Software and user documentation on a permanent basis, provided that the transferee agrees