Index A

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

acceptable use policies  
access control
       authentication
               biometric  
               biometrics  
               Challenge Handshake Authentication Protocol (CHAP)   2nd   3rd  
               digital certificates   2nd  
               evaluating levels of  
               function of  
               Kerberos   2nd   3rd   4th  
                multifactor  
               mutual  
               password-form  
               strengths  
               token-based  
               tokens  
               username/password combination   2nd  
               weaknesses  
       DAC (Discretionary Access Control)
               basis for access control lists (ACLs)  
       Discretionary Access Control (DAC)  
       Domain 1.0 skill set (general security concepts)  
       encryption benefits   2nd  
       exam practice questions   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th  
       least privilege practices   2nd  
       MAC (Mandatory Access Control)
               sensitivity labels   2nd  
       Mandatory Access Control (MAC)  
       networks
               hardening measure   2nd  
       nondiscretionary  
       nonessential services
               disabling   2nd  
       physical security   2nd  
               environment   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
               facilities   2nd   3rd   4th   5th   6th   7th  
               physical barriers   2nd  
               social engineering   2nd   3rd   4th   5th   6th  
       planning   2nd  
       privileges
               auditing   2nd  
       RBAC (Role-Based Access Control)
               employee functions  
               lattice-based  
                task-based  
       RBAC (Rule-Based Access Control)
               router/firewall implementation   2nd  
       role-based (RBAC)  
       single sign-on (SSO)   2nd  
       Trusted Computer System Evaluation System (TCSEC)  
       XML Access Control Language (XACL)  
access control lists (ACLs)
       discretionary access control  
access controls
        group -based  
       management
               centralized versus decentralized   2nd  
       privileges  
       role-based  
        user -based  
Acid Rain (Trojan horse)  
ActiveX controls
       signed versus unsigned execution  
       vulnerabilities  
administrators
       user education
               implementing   2nd   3rd  
                methods   2nd  
Advanced Encryption Standard (AES)
       symmetric key algorithm  
Advanced Intelligent Tape (AIT)  
Airopeek NX
       WLAN monitoring tool  
AIT (Advanced Intelligent Tape)  
algorithms
       (cryptography)  
       asymmetric key   2nd   3rd  
               Diffie-Hellman Key Exchange  
               El Gamal Encryption Algorithm  
               Elliptic Curve Cryptography (ECC)  
               Rivest, Shamir & Adelman Encryption Algorithm (RSA)  
       Domain 4.0 skill set (cryptography basics)  
       function of  
        hashed   2nd  
               Message Digest Series Algorithm (MD2/MD4/MD5)   2nd  
               RIPEMD-160  
               Secure Hash Algorithm (SHA/SHA-1)   2nd  
       symmetric key  
               Advanced Encryption Standard (AES)  
               block ciphers  
               Blowfish Encryption Algorithm  
               comparison chart   2nd  
               Data Encryption Standard (DES)  
               International Data Encryption Algorithm (IDEA)  
               Rivest Cipher (RC2/RC4/RC5/RC6)  
               stream ciphers  
               Triple Data Encryption Standard (3DES)  
               versus asymmetric key bit strength   2nd   3rd   4th  
       types  
anonymous access
       FTP server vulnerability   2nd  
antivirus policies  
applets (Java)
       signed   2nd  
       vulnerabilities   2nd  
application servers  
application testing
       vulnerability scanning  
application-level gateway
       proxy service firewalls  
applications
       hardening measures
               updates/patches  
architectural documentation   2nd  
assets
       risk identification  
asymmetric key algorithms   2nd   3rd  
       Diffie-Hellman Key Exchange  
       El Gamal Encryption Algorithm  
       Elliptic Curve Cryptography (ECC)  
       Rivest, Shamir & Adelman Encryption Algorithm (RSA)  
       versus symmetric key algorithms
               bit strength   2nd  
asymmetric key encryption
       PKI  
asymmetric keys
       SSL communication  
attack signatures
       header  
       IDSs  
               knowledge-based  
       port  
       string  
attackers
        bastion hosts  
       honeynets
               function of  
       honeypots
               function of  
       social engineering
               common tactics   2nd  
attacks
       back door programs  
               Back Orifice  
               NetBus  
               PCAnywhere  
               preventing   2nd  
               Sub7  
               Terminal Services  
               Virtual Network Computing (VNC)  
       buffer overflows   2nd  
       DDoS
               (distributed denial of service)  
               filter protection  
               zombie machines  
       Domain 1.0 skill set (general security concepts)  
       DoS
               (denial of service)  
               Boink  
               Bonk  
               Fraggle  
               Land  
               ping flood  
               Smurf  
               SYN flood  
               Teardrop  
       exam practice questions   2nd   3rd   4th   5th   6th   7th  
       man-in-the-middle  
       mathematical  
       password guessing  
               birthday  
               brute force   2nd  
               Crack tool  
               dictionary  
               John the Ripper tool  
               L0phtCrack tool  
       PBX telecom systems
               protection measures   2nd  
       port numbers listing   2nd  
       prevention measures  
       replay
               packet sniffer usage  
       shoulder surfing  
       social engineering
               scenarios   2nd   3rd  
       software exploitation  
       spoofing   2nd  
       TCP/IP hijacking  
       weak key encryption  
audit policies  
       exam practice questions  
auditing
       access control privileges   2nd  
       activity types   2nd   3rd  
       Domain 1.0 skill set (general security concepts)  
       policies
               developing   2nd  
authentication
       biometric  
       biometrics  
       Challenge Handshake Authentication Protocol (CHAP)
               Microsoft versions  
               on-demand mechanism  
               replay attacks  
       digital certificates
               public key encryption   2nd  
       Domain 1.0 skill set (general security concepts)  
       encryption benefits  
       evaluating levels of  
       function of  
       Kerberos
               process   2nd  
               symmetric keys   2nd  
       multifactor  
       mutual  
       password-form  
       strengths  
       token-based  
       tokens  
       unencrypted
               FTP server vulnerability  
       username/password combination   2nd  
       weaknesses  
Automatic Private IP Addressing (APIPA)  



Security+ Exam Cram 2 (Exam SYO-101)
Security+ Certification Exam Cram 2 (Exam Cram SYO-101)
ISBN: 0789729105
EAN: 2147483647
Year: 2005
Pages: 162

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net