[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] radio frequency (RF) interference wireless networks 2nd RADIUS (Remote Authentication Dial-In User Service) 2nd remote dial-up authentication issues 2nd RAID (Redundant Array of Inexpensive Disks) RAID (Redundant Array of Inexpensive Disks) RC4 encryption wireless networks recovered key pairs digital certificates registration authorities (RAs) remote access 802.11x wireless networking 2nd clear-text data transmission man-in-the-middle attacks radio traffic detection session hijacking war chalking war driving dial-up authentication RADIUS 2nd 3rd 4th TACACS 2nd 3rd TACACS+ 2nd Domain 2.0 skill set (communication security) networks hardening measure packet-level authentication IPSec 2nd 3rd 4th 5th SSH connections Blowfish encryption DES encryption IDEA encryption scp utility slogin utility SSL interface VPNs L2TP implementation 2nd 3rd 4th PPTP implementation 2nd 3rd 4th remote access policies Remote Access Service (RAS) security controls 2nd Remote Authentication Dial-In User Service, [See RADIUS]2nd [See RADIUS] removable media CD-Rs (recordable CDs) destroying dye colors data disposal methods declassification degaussing destruction overwriting sanitization discard methods declassification degaussing destruction overwriting sanitization flashcards device usage information discard options floppy disks storage guidelines hard drives storage guidelines security risks 2nd smartcards device usage information discard options integrated circuit cards (ICCs) stored value type tape AIT (Advanced Intelligent Tape) copy backups DAT (Digital Audio Tape) differential backups DLT (Digital Linear Tape) full backups incremental backups QIC (Quarter Inch Cartridge) rotation methods storage requirements 2nd Super DLT (Digital Linear Tape) Travan removing protocols from servers services from servers renewed digital certificates replay attacks Challenge Handshake Authentication Protocol (CHAP) packet sniffer usage required services establishing 2nd resources books CCNA Cisco Certified Network Associate Study Guide CERT Guide to System and Network Security Practices 2nd 3rd CISSP Prep Guide CISSP Training Guide Computer Networks Computer Networks and Internets Guide to TCP/IP Hack Attacks Denied 2nd 3rd Hack Attacks Revealed Hackers Beware Hacking Exposed Information Security Management Handbook IP Fundamentals Maximum Security, Third Edition Network Security Private Communication in a Public World Operating System Concepts Planning for PKI TCP/IP Illustrated online IETF ITU NIST RSA Security restoration procedures backup policies 2nd 3rd retaking exams retinal scans (biometrics) reverse social engineering Rijndael algorithm RIPEMD-160 Algorithm risk assessment security policy planning risk assesssment exam practice questions risk identification assessment guidelines 2nd assets inventory Domain 5.0 skill set (operational/organizational security) threat guidelines 2nd vulnerability-scanning tools 2nd 3rd application testing blind testing dial-up service testing infrastructure testing Internet service testing knowledgable testing network testing Rivest Cipher (RC2/RC4/RC5/RC6) symmetric key algorithm Rivest, Shamir & Adelman Encryption Algorithm (RSA) asymmetric key algorithm Role-Based Access Control (RBAC) employee functions lattice-based task-based role-based access control model rollback strategies system modifications 2nd root CA model (Certificate Authorities) rotating tapes routers OSI Network layer protocols Border Gateway Protocol (BGP) Enhanced Interior Gateway Routing Protocol (EIGRP) Exterior Gateway Protocol (EGP) Interior Gateway Routing Protocol (IGRP) Open Shortest Path First (OSPF) Routing Information Protocol (RIP) Rule-Based Access Control (RBAC) 2nd Routing Information Protocol (RIP) RSA Cryptography Standard PKCS document #1 RSA encryption S/MIME email transmissions RSA Security Web site cryptographic resources cryptography resources PKCS resources Rule-Based Access Control (RBAC) router/firewall implementation 2nd |