[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] sample practice exam #1 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th answer key 2nd sample practice exam #2 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th answer key 2nd 3rd SANS Information Security Reading Room Web site saving PIX firewall configuration 2nd SSH information 2nd 3rd 4th 5th scaling VPN tunnels SCCP (Skinny Client Control Protocol) 2nd VoIP family 2nd script kiddies unstructured threats scripts ActiveX filtering 2nd Secure Hash Algorithm (SHA-1) 2nd 3rd 4th Secure Shell (SSH) ca generate rsa key command 2nd ca save all command domain- name command hostname command information displaying 2nd 3rd 4th 5th saving 2nd 3rd 4th 5th PIX firewall access 2nd 3rd 4th 5th 6th 7th show ca mypubkey rsa command show shh sessions command ssh command 2nd ssh disconnect session command Security Alert dialog box PDM connections security association (authentication) IPSec security associations (SA) creating between peers (IPSec) 2nd 3rd 4th 5th 6th security levels adaptive security algorithm (ASA) PIX firewalls 2nd security policy security process Cisco Security Wheel 2nd monitoring the environment policy improvements securing the environment testing the environment security threats additional resources exam prep questions 2nd 3rd 4th 5th 6th 7th external internal structured unstructured Security Warning dialog box PDM connections self-assessments 2nd educational background 2nd hands-on experience 2nd servers DHCP automatic configuration dhcp address command dhcpd auto config command dhcpd dns command dhcpd domain command dhcpd lease command dhcpd ping timeout command dhcpd wins command manual configuration Web filters linking to 2nd 3rd 4th 5th 6th 7th monitoring N2H2 configuration 2nd 3rd 4th 5th WebSense configuration 2nd 3rd 4th 5th session hijacking preventing (DNS Guard) 2nd Session Initiation Protocol, [See SIP] setting date manually 2nd 3rd 4th 5th 6th 7th time manually 2nd 3rd 4th 5th 6th 7th severity levels logging on PIX firewall 2nd 3rd show aaa command show aaa-server command show access- group command show access-list command 2nd show activation-key command activation keys PIX firewalls 2nd show arp command (CLI) show clock command show conn command (CLI) show conn commands 2nd show crypt map command (IPSec) show crypto ipsec sa command (IPSec) show crypto ipsec transform-set command (IPSec) show dhcp binding command show dhcp command show dhcp statistics command show fixup commmand show history command (CLI) show interface command (CLI) 2nd show IP address command (CLI) show isakmp command (IPSec) show isakmp policy command (IPSec) show isakmp sa command (IPSec) show logging command 2nd show ntp associations command show ntp command show ntp status command show object-group command show perfmon command show shun command (IDS) show startup command (CLI) show uauth command show url-cache stat command show url-server command show version command activation keys PIX firewalls 2nd show version command (CLI) 2nd show xlate command (CLI) shun command (IDS) signatures (IDS) attack 2nd actions audit policies disabling false positives global audit policies informational 2nd actions specific audit policies Simple Network Management Protocol, [See SNMP] SIP (Session Initiation Protocol) VoIP family site-to-site VPNs Skinny Client Control Protocol, [See SCCP]2nd [See SCCP] SMTP (Simple Mail Transfer Protocol) 2nd traffic inspection via Mail Guard 2nd SMTP servers Mail Guard functions 2nd SNMP (Simple Network Management Protocol) configuring on PIX firewall 2nd management stations logging PIX firewall information network management stations (NMSs) traps versions PIX firewall support social engineering software failover requirements 2nd 3rd 4th software licensing PIX firewall 2nd 3rd specific audit policies (IDS) configuring spoofing packet filters SQL*Net fixups SSH (Secure Shell) 2nd 3rd 4th 5th 6th 7th ca generate rsa key command 2nd ca save all command domain-name command hostname command information displaying 2nd 3rd 4th 5th saving 2nd 3rd 4th 5th PIX firewall access 2nd 3rd 4th 5th 6th 7th show ca mypubkey rsa command show ssh sessions command ssh command 2nd ssh disconnect session command ssh command (SSH) PIX firewall access 2nd stacked firewalls standard mode (FTP) 2nd Startup Wizard Access Rules tab Monitoring tab PDM loading 2nd 3rd stateful failovers 2nd replication of 2nd stateful packet filters firewalls OSI layers states failovers forcing static address translation (NAT) 2nd 3rd static command 2nd 3rd options 2nd 3rd paring with conduit command 2nd static routing firewalls 2nd 3rd structured threats study preparation (exam) memorization strategies 2nd symmetric keys SYN attacks SYN Floodguard TCP/SYN attacks preventing 2nd 3rd syslog servers logging on PIX firewall 2nd sysopt connection permit-ipsec command 2nd sysopt connection permit-pptp command System Properties tab PIX firewall configuration (PDM) system requirements PDM devices 2nd 3rd supported clients unsupported commands 2nd |