Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] packet PDU (protocol data unit) 2nd packet-filtering firewalls 2nd paper tests passive attacks 2nd passwords 2nd cognitive passwords dictionary attacks one-time passwords paths access paths payments EFT (electronic funds transfer) PDAs (personal digital assistants) PDU (protocol data unit) bits PDU 2nd data PDU 2nd frame PDU 2nd 3rd packet PDU 2nd segment PDU 2nd penetration testing 2nd 3rd penetration tests performance performance-measurement techniques 2nd performance indicators 2nd 3rd 4th personal digital assistants (PDAs) personnel management personnel-management techniques 2nd 3rd PERT (program evaluation review technique) 2nd physical controls 2nd 3rd 4th 5th biometric systems 2nd Physical layer (OSI) 2nd physical security controls 2nd PKI (public key infrastructure) 2nd 3rd planning BCP (business continuity management) strategies and policies 2nd 3rd BCPs (business continuity plans) 2nd backup and storage 2nd 3rd 4th 5th BIA (business impact analysis) 2nd 3rd 4th 5th cold sites critical functions duplicate processing facilities 2nd evacuation planning 2nd 3rd evaluating 2nd 3rd 4th 5th 6th 7th 8th exam prep questions 2nd 3rd 4th hot sites 2nd insurance 2nd natural disaster costs noncritical functions process development 2nd 3rd reciprocal agreements 2nd 3rd 4th 5th response teams 2nd 3rd sensitive functions testing 2nd 3rd vital functions warm sites DRP (disaster recovery planning) strategies and policies 2nd 3rd DRPs (disaster recovery plans) 2nd backup and storage 2nd 3rd 4th 5th BIA (business impact analysis) 2nd 3rd 4th 5th cold sites critical functions duplicate processing facilities 2nd evacuation planning 2nd 3rd evaluating 2nd 3rd 4th 5th 6th 7th 8th exam prep questions 2nd 3rd 4th hot sites 2nd insurance 2nd natural disaster costs noncritical functions process development 2nd 3rd reciprocal agreements 2nd 3rd 4th 5th response teams 2nd 3rd sensitive functions testing 2nd 3rd vital functions warm sites IS steering committees 2nd planning policies projects strategic planning 2nd 3rd 4th planning policies Point-to-Point Tunneling Protocol (PPTP) policies 2nd advisory policies BCP (business continuity management) 2nd 3rd contingency policies contract management 2nd confidentiality agreements contract audit objectives 2nd discovery agreements employee contracts noncompete agreements trade secret agreements deployment evaluating process for 2nd development 2nd evaluating process for 2nd DRP (disaster recovery planning) 2nd 3rd ensuring compliance with 2nd 3rd financial and accounting policies hardware policies informative policies network policies operations policies organizational policies planning policies problem- and change management 2nd 3rd project management 2nd 3rd 4th project life cycle 2nd risk indicators 2nd system upgrade risks 2nd quality management 2nd 3rd 4th 5th accreditation certification ISO 9001 2nd ISO 9126 2nd QA (quality assurance) QC (quality control) Software Capability Maturity Model (CMM) 2nd regulatory policies security security management 2nd 3rd 4th 5th 6th 7th CIA triad data integrity risks 2nd logical controls 2nd 3rd physical controls 2nd security policies policies. [See also procedures, strategies] policy development 2nd evaluating process for 2nd polymorphic viruses post-implementation review techniques 2nd power failures 2nd PPTP (Point-to-Point Tunneling Protocol) practice exam 1 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th answer key 2nd 3rd 4th 5th 6th practice exam 2 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th answer key 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th practices application-implementation practices 2nd preparedness tests Presentation layer (OSI) 2nd 3rd preserving evidence 2nd 3rd print services private keys problem logs problem management procedures 2nd strategies and policies 2nd 3rd procedures 2nd 3rd 4th definition of ensuring compliance with 2nd 3rd security procedures. [See also policies, strategies] process owners security management responsibilities processes application system-acquisition processes 2nd processing controls 2nd procurement control program evaluation review technique (PERT) 2nd programming languages project management 2nd 3rd 4th 5th CPM (Critical Path Methodology) FPA (function point analysis) 2nd PERT (program evaluation review technique) 2nd strategies and policies 2nd 3rd 4th project life cycle 2nd risk indicators 2nd system upgrade risks 2nd work breakdown structure projects closing controlling life cycle 2nd monitoring planning scheduling property insurance 2nd protection. [See security] protocol data unit. [See PDU] protocols ARP (Address Resolution Protocol) DNS (Domain Name Service) ICMP (Internet Control Message Protocol) IP (Internet Protocol) IPSec NFS (Network File System) PPTP (Point-to-Point Tunneling Protocol) SMTP (Simple Mail Transfer Protocol) SSL (Secure Sockets Layer) TCP (Transmission Control Protocol) TCP/IP (Transmission Control Protocol/Internet Protocol) 2nd 3rd Telnet (Remote Terminal Control Protocol) tunneling protocol UDP (User Datagram Protocol) prototyping 2nd proxy firewalls 2nd 3rd 4th 5th 6th public key infrastructure (PKI) 2nd 3rd public keys 2nd 3rd |