Index S

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

S/FTP
       (FTP with SSL encapsulation)  
S/MIME
       (Secure Multipurpose Internet Mail Extension)  
       email data transmission  
SAFEsuite scanner  
SAINT scanner
       ( Security Administrator's Integrated Network Tool)  
SAINT Web site
       FTP vulnerability resources  
sanitization
       removable media discard method  
sanitizing
       data  
SANS.org Web site
       Information Security Reading Room   2nd  
       top 20 security vulnerabilities  
       vulnerabilities list  
SATAN scanner
       (Security Administrator's Tool for Analyzing Networks)  
scanners (vulnerability)  
       Nessus  
       NetRecon  
       Nmap  
       SAFEsuite  
       SAINT  
       SATAN  
       Tiger Tools TigerSuite  
scoring
       exams  
scp function (SSH utility)  
screened host gateways   2nd  
screened subnet gateways   2nd  
secret data
       handling   2nd  
Secure Hash Algorithm (SHA/SHA-1)   2nd  
Secure Multipurpose Internet Mail Extension,   [See S/MIME]
Secure Multipurpose Internet Mail Extensions (S/MIME)  
Secure Shell utility,   [See SSH utility]
Secure Sockets Layer,   [See SSL]2nd   [See SSL]
SecurID token (RSA Security)  
security
       topologies  
                bastion -host firewall  
               screened host gateways   2nd  
               screened subnet gateways   2nd  
security baselines
       Domain 3.0 skill set (infrastructure security)   2nd  
security policies
       auditing
               developing   2nd  
       disaster recovery plans
               acceptable use  
               compliance  
               disposal/destruction  
               due care  
               human resources  
               incident reponse  
               password management  
               privacy  
               risk assessment  
               separation of duties  
       Domain 5.0 skill set (operational/organizational security)   2nd  
       exam practice questions  
security topologies
       Domain 3.0 skill set (infrastructure security)  
Security+ Exam,   [See exams (Exam (SY0-101)]
selecting
       backup strategies
               disaster recovery   2nd  
self-assessment
       candidate qualifications   2nd   3rd   4th   5th  
               educational background   2nd   3rd  
               hands-on experience   2nd   3rd   4th  
       exam-readiness
               testing   2nd   3rd  
       overview   2nd  
sensitive data
       handling   2nd  
sensitivity labels (MAC)   2nd  
separation of duties
       security policy planning  
server security policies  
servers
       attack vulnerabilities  
       FTP
               vulnerabilities   2nd   3rd   4th   5th   6th   7th  
       protocols
               removing  
       required protocols
               determining   2nd  
       roles
               application  
               email  
               establishing   2nd  
               file  
               FTP  
               logon  
               network services  
               news  
               print  
               Use (NNTP)  
               Web  
       security measures
               RAID (Redundant Array of Inexpensive Disks)  
               uninterruptible power supply (UPS)  
       services
               removing  
services
       critical
               establishing   2nd  
       data repositories
               hardening measures  
       DHCP services
               hardening measures  
       DNS services
               hardening measures  
       email services
               hardening measures  
       file services
               hardening measures   2nd  
       FTP services
               hardening measures  
       NTTP services
               hardening measures  
       print services
               hardening measures   2nd  
       required
               establishing   2nd  
       servers
               removing  
       Web services
               hardening measures  
session hijacking attacks
       WLANs  
shielding
       Faraday cage   2nd  
       TEMPEST (Transient Electromagnetic Pulse Emanation Standard)  
shoulder surfing attacks  
signatures (biometrics)  
signed applets (Java)   2nd  
Simple Mail Transport Protocol,   [See SMTP]2nd   [See SMTP]
Simple Network Management Protocol,   [See SNMP]2nd   [See SNMP]
Simpsons (Trojan horse)  
single sign-on (SSO)
       access control measure   2nd  
site surveys
       wireless networks
               poor planning   2nd  
               protection measures  
skill sets (exams)
       Domain 1.0 (general security concepts)  
               access control  
               attacks  
               auditing  
               authentication  
               malicious code  
               social engineering  
       Domain 2.0 (communication security)  
               directories  
               email  
               file transfers  
               remote access  
               Web data transmission  
               wireless networks  
       Domain 3.0 (infrastructure security)  
               devices   2nd  
               intrusion detection  
               media  
               security baselines   2nd  
               security topologies  
       Domain 4.0 (cryptography basics)  
               algorithms  
               certificate lifecycles   2nd  
               key management   2nd  
               PKI  
               standards/protocols  
       Domain 5.0 (operational/organizational security)  
               business continuity  
               disaster recovery  
               documentation  
               education  
               forensics  
               physical security  
               privilege management  
               risk identification  
               security policies   2nd  
       weighted scoring averages   2nd  
slogin function (SSH utility)  
smartcards
       device usage  
       information discard options  
       integrated circuit cards (ICCs)  
       stored value type  
SMTP
       (Simple Mail Transport Protocol)   2nd  
       Relay agents
                spamming attacks   2nd  
Smurf attack (DoS)  
Sniffer Wireless
       WLAN monitoring tool  
sniffers
       replay attacks  
SNMP
       (Simple Network Management Protocol)   2nd  
       security measures   2nd  
       TCP/IP statistics   2nd  
       versions   2nd  
social engineering
        attackers
               common tactics   2nd  
       common examples   2nd  
       Domain 1.0 skill set (general security concepts)  
       management training  
       reverse  
       scenarios   2nd   3rd  
       tiger teams
               vulnerability testing  
        user training  
software
       architectural documentation  
       change documentation
               impact assessments   2nd  
       updates
               network hardening measure  
software exploitation attacks  
software requirements
       PrepLogic Practive Tests  
Sophos Antivirus Web site  
spam
       Web sites
               Mail-Abuse.org  
               Spam Primer  
spam (email)
       handling   2nd  
        open SMTP relays   2nd  
Spam Primer Web site  
spoofing
       IP addresses   2nd  
SSH protocol
       as alternative to Telnet protocol  
SSH utility
       (Secure Shell)  
               Blowfish encryption  
               DES encryption  
               IDEA encryption  
       remote access issues  
               Blowfish encryption  
               DES encryption  
               IDEA encryption  
               scp function  
               slogin function  
SSH.com Web site  
SSL
       (Secure Sockets Layer)  
       (Secure Sockeys Layer)  
       asymmetric key communication  
       cipher strengths  
       Linux Slapper worm  
       protocol vulnerabilities   2nd  
       remote access issues  
       stateful connections  
standards
       Domain 4.0 skill set (cryptography basics)   2nd   3rd   4th   5th  
stateful-inspection firewalls  
Stoned virus  
stored value smartcards  
STP ( shielded twisted-pair) cable
       security vulberabilities  
stream ciphers
       symmetric key algorithms  
string signatures
       network-based IDS  
Sub7 program
       back door attacks  
SubSeven program
       back door attacks  
Super Digital Linear Tape (DLT)  
Super DLT (Digital Linear Tape)  
suspended digital certificates  
switches
       frame filtering  
       loop prevention  
       MAC addresses  
       OSI Data Link layer  
Symantec Antivirus Web site  
symmetric key algorithms  
       Advanced Encryption Standard (AES)  
       block ciphers  
       Blowfish Encryption Algorithm  
       comparison chart   2nd  
       Data Encryption Standard (DES)  
       International Data Encryption Algorithm (IDEA)  
       Rivest Cipher (RC2/RC4/RC5/RC6)  
       stream ciphers  
       Triple Data Encryption Standard (3DES)  
       versus asymmetric key algorithms
               bit strength   2nd  
symmetric keys
       Kerberos authentication   2nd  
               process   2nd  
SYN flood attack (DoS)  



Security+ Exam Cram 2 (Exam SYO-101)
Security+ Certification Exam Cram 2 (Exam Cram SYO-101)
ISBN: 0789729105
EAN: 2147483647
Year: 2005
Pages: 162

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net