Index C

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

cabling
       coaxial
               10Base2 (thinnet)  
               10Base5 (thicknet)  
               security vulnerabilities  
               sheaths  
       fiber
               signal tapping elimination  
               transmission speeds  
       twisted-pair
               STP  
               UTP  
candidates
       ideal qualifications   2nd   3rd   4th   5th  
               educational background   2nd   3rd  
               hands-on experience   2nd   3rd   4th  
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CD)
       IEEE 802.11x standard  
CCNA Cisco Certified Network Associate Study Guide  
CD-Rs
       (recordable CDs)  
       destroying  
       dye colors  
cell phones
       wireless security
               VoIP (Voice over IP) technology  
centralized access control management   2nd  
centralized key management   2nd  
CERT Coordination Center Web site  
CERT Guide to System and Network Security Practices   2nd   3rd  
CERT Web site
       FTP exploits  
       Incident Report Guidelines Page  
certificate authorities (CAs)  
       ActiveX controls  
Certificate Authorities (CAs)
       digital certificates
               certificate policies   2nd  
               Certificate Practice Statements (CPS)   2nd  
               Certificate Revocation List (CRL)   2nd  
               common uses  
               example  
               function of  
               information elements   2nd  
certificate authorities (CAs)
       key escrow   2nd  
       Online Certificate Status Protocol (OCSP)  
Certificate Authorities (CAs)
       PKI implementation  
               cerficiate policies   2nd  
               Certificate Practice Statements (CPS)   2nd  
               Certificate Revocation List (CRL)   2nd  
               common uses  
               information elements   2nd  
               trust models   2nd   3rd  
                vendors  
certificate authorities (CAs)
       signed applets (Java)   2nd  
Certificate Enrollment Protocol (CEP)  
Certificate Management Protocol (CMP)  
certificate policies
       digital certificates   2nd  
       lifecycle components   2nd  
Certificate Practice Statement (CPS)
       certificate lifecycles   2nd  
Certificate Practice Statements (CPS)
       digital certificates   2nd  
Certificate Revocation List (CRL)  
       digital certificates   2nd  
               status checking  
certificates
       Domain 4.0 skill set (cryptography basics)   2nd  
certification
       career benefits of  
       exam development  
       vendor-neutrality  
Certification Magazine
       credentials survey  
Certification Request Syntax Standard
       PKCS document #10  
CGI
       (Common Gateway Interface)   2nd  
       script vulnerabilities
               buffer overflows  
               information leaks  
               profiling  
chain of custody (evidence)
       computer forensics   2nd  
Challenge Handshake Authentication Protocol (CHAP)
       Microsoft versions  
       on-demand mechanism  
       replay attacks  
change documentation   2nd  
       impact assessments   2nd  
chip-integrated smartcards
       authentication token  
ciphertext -only attacks  
circuit-level gateway
       proxy service firewalls  
CISSP Prep Guide  
CISSP Training Guide  
classes
       private IP addresses   2nd  
classifying
       data status
               confidential   2nd  
               secret   2nd  
               sensitive   2nd  
               top secret   2nd  
               unclassified   2nd  
clustering
       as business continuity element  
coaxial cable
       10Base2 (thinnet)  
       10Base5 (thicknet)  
       security vulnerabilities  
       sheaths  
Code Red worm  
Common Criteria Technology Security Evaluation  
communication security
       exam practice questions   2nd   3rd   4th   5th   6th   7th   8th  
Compact Wireless Application Protocol,   [See CWAP]2nd   [See CWAP]
compliance measures
       security policy planning  
CompTIA
       Web site
               exam resources  
CompTIA Web site
       exam training venues  
computer forensics  
       chain of custody   2nd  
       collection of evidence   2nd   3rd  
       preservation of evidence   2nd  
Computer Forensics Web site  
Computer Networks  
Computer Networks and Internets  
confidential data
       handling   2nd  
confidentiality
       encryption benefits   2nd  
cookies
       function of  
       privacy issues  
       session values   2nd  
copy backups
       disaster recovery  
copy backups (tapes)  
countermeasures
       IDS response  
Crack tool
       password guessing attacks  
Cram Session Web site
       exam practice resources  
critical services
       establishing   2nd  
cross-certification CA model (Certificate Authorities)  
Cryptographic Message Syntax Standard
       PKCS document #7  
Cryptographic Token Information Format Standard
       PKCS document #15  
Cryptographic Token Interface Standard
       PKCS document #11  
cryptography
       algorithms
               asymmetric key   2nd   3rd   4th   5th   6th   7th  
               function of  
                hashed   2nd   3rd   4th   5th   6th   7th  
               symmetric key   2nd  
               types  
       ancient origins  
       Certificate Enrollment Protocol (CEP)  
       Certificate Management Protocol (CMP)  
       chapter practice questions   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
       Common Criteria for Information Technology Security Evaluation  
       encryption
               access control   2nd  
               authentication  
               bit strength  
               confidentiality   2nd  
               implementation guidelines   2nd  
               integrity   2nd   3rd   4th   5th   6th   7th  
               nonrepudiation   2nd   3rd  
       exam practice questions   2nd   3rd   4th   5th   6th   7th   8th   9th  
       Federal Information Processing Standard (FIPS)  
       Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)  
       Internet Protocol Security (IPSec)  
       Internet Security Association and Key Management Protocol (ISAKMP)  
       ISO 17799  
       ISO 17799 (Code of Practice for Information Security)   2nd   3rd  
       mechanical  
       online resources
               How Stuff Works Web site  
               IETF Web site   2nd  
               ITU Web site  
               Microsoft Kerberos Web site  
               NIST Web site   2nd  
               RSA Security Web site   2nd  
               W3C Web site  
       PKCS
               Certification Request Syntax Standard  
               Cryptographic Message Syntax Standard  
               Cryptographic Token Information Format Standard  
               Cryptographic Token Interface Standard  
               development by RSA Laboratories  
               Diffie-Hellman Key Agreement  
               Elliptic Curve Cryptography Standard  
               Extended-Certificate Syntax Standard  
               Password-Based Cryptography Standard  
               Personal Information Exchange Syntax Standard  
               Private Key Information Syntax Standard  
               Pseudo Random Generator  
               RSA Cryptography Standard  
       Pretty Good Privacy (PGP)  
       Secure Multipurpose Internet Mail Extensions (S/MIME)  
       Secure Sockets Layer (SSL)  
       Transport Layer Security (TLS)  
       Wired Equivalent Privacy (WEP)  
       Wireless Transport Layer Security (WTLS)  
       X.509 PKI infrastructure  
       X.509 standards  
               required fields   2nd  
               Version 1  
               Version 2  
               Version 3  
       XML Key Management Specification (XKMS)  
CWAP
       (Compact Wireless Application Protocol)   2nd  



Security+ Exam Cram 2 (Exam SYO-101)
Security+ Certification Exam Cram 2 (Exam Cram SYO-101)
ISBN: 0789729105
EAN: 2147483647
Year: 2005
Pages: 162

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net