[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] L0phtCrack tool password guessing attacks L2TP (Layer 2 Tunneling Protocol) VPN remote access 2nd 3rd 4th Land attack (DoS) laptops security measures Layer 2 Tunneling Protocol (L2TP) Layer 2 Tunneling Protocol, [See L2TP] layered IDSs layers (OSI model) encapsulation LDAP (Lightweight Directory Access Protocol) DEN standard (Directory enabled Networking) protocol vulnerabilities buffer overflows DoS attacks format strings Lightweight Directory Access Protocol, [See LDAP] line-of-sight access physical security violation Linux Slapper worm lock mechanisms facility security logic bombs (malicious code) logon servers logs documentation policies exam practice questions |