Index F

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

facial geometry (biometrics)  
facilities
       physical security  
               biometrics  
               evacuation procedures   2nd  
               external doors  
               external lighting  
               external motion detectors  
               fencing  
                guards /dogs  
               internal motion detectors  
               lock mechanisms  
               mantraps  
               moats  
               no-man's land  
               piggyback intruders  
FAQS.org Web site  
Faraday cage
       electronic eavesdropping protection   2nd  
fault tolerance
       RAID (Redundant Arrays of Inexpensive Disks)  
Federal Information Processing Standard (FIPS)  
fencing
       facility security  
fiber cabling
       signal tapping elimination  
       transmission speeds  
file servers  
       services
               hardening measures   2nd  
file sharing
       FTP server vulnerability   2nd  
file transfers
       Domain 2.0 skill set (communication security)  
file-sharing systems
       instant messaging vulnerability   2nd  
filtering
       spam (email)   2nd  
filters
       DDoS attack protection  
       IP addresses
               spoofing attacks   2nd  
fingerprint scans (biometrics)  
fire suppression methods
       chemical system  
       dry-pipe system  
       employee training  
       heat/smoke alarms  
       wet-pipe system  
firewalls
        bastion -host  
       DMZ configurations   2nd  
       example  
       extranet configurations  
       intranet configurations  
       Invir.com Web site  
       networks
               hardening measure  
       packet-filtering  
       proxy-service
               application-level gateway  
                circuit-level gateway  
       Rule-Based Access Control (RBAC)   2nd  
       stateful-inspection  
       VPN tunneling issues  
flashcards
       device usage  
       information discard options  
floppy disks
       storage guidelines  
forensics
       Domain 5.0 skill set (operational/organizational security)  
forensics (computer)  
       chain of custody   2nd  
       collection of evidence   2nd   3rd  
       preservation of evidence   2nd  
forensics (computers)
       Computer Forensics Web site  
       exam practice questions  
format strings
       LDAP vulnerability  
Fraggle attack (DoS)  
frames
       filtering/forwarding (switches)  
FTP
       function of  
       RFC security extensions  
       S/FTP (FTP with SSL encapsulation)  
       vulnerabilities
               anonymous server access   2nd  
               blind server access  
               file sharing   2nd  
               SAINT Web site resources  
               server rogue code execution  
               unencrypted authentication  
FTP servers  
       services
               hardening measures  
full backups
       disaster recovery  
full backups (tapes)  



Security+ Exam Cram 2 (Exam SYO-101)
Security+ Certification Exam Cram 2 (Exam Cram SYO-101)
ISBN: 0789729105
EAN: 2147483647
Year: 2005
Pages: 162

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net