Index S


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

sample practice exam #1   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th  
       answer key   2nd  
sample practice exam #2   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th  
       answer key   2nd   3rd  
SANS Information Security Reading Room Web site  
saving
       PIX firewall configuration   2nd  
       SSH information   2nd   3rd   4th   5th  
scaling
       VPN tunnels  
SCCP
       (Skinny Client Control Protocol)   2nd  
       VoIP family   2nd  
script kiddies
       unstructured threats  
scripts
       ActiveX
               filtering   2nd  
Secure Hash Algorithm (SHA-1)   2nd   3rd   4th  
Secure Shell (SSH)
       ca generate rsa key command   2nd  
       ca save all command  
       domain- name command  
       hostname command  
       information
               displaying   2nd   3rd   4th   5th  
               saving   2nd   3rd   4th   5th  
       PIX firewall access   2nd   3rd   4th   5th   6th   7th  
       show ca mypubkey rsa command  
       show shh sessions command  
       ssh command   2nd  
       ssh disconnect session command  
Security Alert dialog box
       PDM connections  
security association (authentication)
       IPSec  
security associations (SA)
       creating between peers (IPSec)   2nd   3rd   4th   5th   6th  
security levels
       adaptive security algorithm (ASA)
               PIX firewalls   2nd  
security policy  
security process
       Cisco Security Wheel   2nd  
               monitoring the environment  
               policy improvements  
               securing the environment  
               testing the environment  
security threats
       additional resources  
       exam prep questions   2nd   3rd   4th   5th   6th   7th  
       external  
       internal  
       structured  
       unstructured  
Security Warning dialog box
       PDM connections  
self-assessments   2nd  
       educational background   2nd  
       hands-on experience   2nd  
servers
       DHCP
               automatic configuration  
               dhcp address command  
               dhcpd auto config command  
               dhcpd dns command  
               dhcpd domain command  
               dhcpd lease command  
               dhcpd ping timeout command  
               dhcpd wins command  
               manual configuration  
       Web filters
               linking to   2nd   3rd   4th   5th   6th   7th  
               monitoring  
               N2H2 configuration   2nd   3rd   4th   5th  
               WebSense configuration   2nd   3rd   4th   5th  
session hijacking
       preventing (DNS Guard)   2nd  
Session Initiation Protocol,   [See SIP]
setting
       date
               manually   2nd   3rd   4th   5th   6th   7th  
       time
               manually   2nd   3rd   4th   5th   6th   7th  
severity levels
       logging on PIX firewall   2nd   3rd  
show aaa command  
show aaa-server command  
show access- group command  
show access-list command   2nd  
show activation-key command
       activation keys
               PIX firewalls   2nd  
show arp command (CLI)  
show clock command  
show conn command (CLI)  
show conn commands   2nd  
show crypt map command (IPSec)  
show crypto ipsec sa command (IPSec)  
show crypto ipsec transform-set command (IPSec)  
show dhcp binding command  
show dhcp command  
show dhcp statistics command  
show fixup commmand  
show history command (CLI)  
show interface command (CLI)   2nd  
show IP address command (CLI)  
show isakmp command (IPSec)  
show isakmp policy command (IPSec)  
show isakmp sa command (IPSec)  
show logging command   2nd  
show ntp associations command  
show ntp command  
show ntp status command  
show object-group command  
show perfmon command  
show shun command (IDS)  
show startup command (CLI)  
show uauth command  
show url-cache stat command  
show url-server command  
show version command
       activation keys
               PIX firewalls   2nd  
show version command (CLI)   2nd  
show xlate command (CLI)  
shun command (IDS)  
signatures (IDS)
       attack   2nd  
               actions  
       audit policies
               disabling  
       false positives  
       global audit policies  
       informational   2nd  
               actions  
       specific audit policies  
Simple Network Management Protocol,   [See SNMP]
SIP
       (Session Initiation Protocol)  
       VoIP family  
site-to-site VPNs  
Skinny Client Control Protocol,   [See SCCP]2nd   [See SCCP]
SMTP
       (Simple Mail Transfer Protocol)   2nd  
       traffic inspection via Mail Guard   2nd  
SMTP servers
       Mail Guard functions   2nd  
SNMP
       (Simple Network Management Protocol)  
       configuring on PIX firewall   2nd  
       management stations
               logging PIX firewall information  
       network management stations (NMSs)  
       traps  
       versions
               PIX firewall support  
social engineering  
software
       failover requirements   2nd   3rd   4th  
software licensing
       PIX firewall   2nd   3rd  
specific audit policies (IDS)
       configuring  
spoofing
       packet filters  
SQL*Net
       fixups  
SSH
       (Secure Shell)   2nd   3rd   4th   5th   6th   7th  
       ca generate rsa key command   2nd  
       ca save all command  
       domain-name command  
       hostname command  
       information
               displaying   2nd   3rd   4th   5th  
               saving   2nd   3rd   4th   5th  
       PIX firewall access   2nd   3rd   4th   5th   6th   7th  
       show ca mypubkey rsa command  
       show ssh sessions command  
       ssh command   2nd  
       ssh disconnect session command  
ssh command (SSH)
       PIX firewall access   2nd  
stacked firewalls  
standard mode (FTP)   2nd  
Startup Wizard
       Access Rules tab  
       Monitoring tab  
       PDM
               loading   2nd   3rd  
stateful failovers   2nd  
       replication of   2nd  
stateful packet filters
       firewalls
               OSI layers  
states
       failovers
               forcing  
static address translation (NAT)   2nd   3rd  
static command   2nd   3rd  
       options   2nd   3rd  
       paring with conduit command   2nd  
static routing
       firewalls   2nd   3rd  
structured threats  
study preparation (exam)  
       memorization strategies   2nd  
symmetric keys  
SYN attacks  
SYN Floodguard
       TCP/SYN attacks
               preventing   2nd   3rd  
syslog servers
       logging on PIX firewall   2nd  
sysopt connection permit-ipsec command   2nd  
sysopt connection permit-pptp command  
System Properties tab
       PIX firewall configuration (PDM)  
system requirements
       PDM
               devices   2nd   3rd  
               supported clients  
               unsupported commands   2nd  



CSPFA Exam Cram 2 (Exam 642-521)
CCSP CSPFA Exam Cram 2 (Exam Cram 642-521)
ISBN: 0789730235
EAN: 2147483647
Year: 2003
Pages: 218

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net