Index R

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

radio frequency (RF) interference
       wireless networks   2nd  
RADIUS
       (Remote Authentication Dial-In User Service)   2nd  
       remote dial-up authentication issues   2nd  
RAID
       (Redundant Array of Inexpensive Disks)  
RAID (Redundant Array of Inexpensive Disks)  
RC4 encryption
       wireless networks  
recovered key pairs
       digital certificates  
registration authorities (RAs)  
remote access
       802.11x wireless networking   2nd  
               clear-text data transmission  
               man-in-the-middle attacks  
               radio traffic detection  
               session hijacking  
               war chalking  
               war driving  
       dial-up authentication
               RADIUS   2nd   3rd   4th  
               TACACS   2nd   3rd  
               TACACS+   2nd  
       Domain 2.0 skill set (communication security)  
       networks
               hardening measure  
       packet-level authentication
               IPSec   2nd   3rd   4th   5th  
       SSH connections  
               Blowfish encryption  
               DES encryption  
               IDEA encryption  
               scp utility  
                slogin utility  
       SSL interface  
       VPNs
               L2TP implementation   2nd   3rd   4th  
               PPTP implementation   2nd   3rd   4th  
remote access policies  
Remote Access Service (RAS)
       security controls   2nd  
Remote Authentication Dial-In User Service,   [See RADIUS]2nd   [See RADIUS]
removable media
       CD-Rs (recordable CDs)  
               destroying  
               dye colors  
       data disposal methods
               declassification  
               degaussing  
               destruction  
               overwriting  
                sanitization  
       discard methods
               declassification  
               degaussing  
               destruction  
               overwriting  
               sanitization  
       flashcards
               device usage  
               information discard options  
       floppy disks
               storage guidelines  
       hard drives
               storage guidelines  
       security risks   2nd  
       smartcards
               device usage  
               information discard options  
               integrated circuit cards (ICCs)  
               stored value type  
       tape  
               AIT (Advanced Intelligent Tape)  
               copy backups  
               DAT (Digital Audio Tape)  
               differential backups  
               DLT (Digital Linear Tape)  
               full backups  
               incremental backups  
               QIC (Quarter Inch Cartridge)  
               rotation methods  
               storage requirements   2nd  
               Super DLT (Digital Linear Tape)  
               Travan  
removing
       protocols
               from servers  
       services
               from servers  
renewed digital certificates  
replay attacks
       Challenge Handshake Authentication Protocol (CHAP)  
       packet sniffer usage  
required services
       establishing   2nd  
resources
       books
               CCNA Cisco Certified Network Associate Study Guide  
               CERT Guide to System and Network Security Practices   2nd   3rd  
               CISSP Prep Guide  
               CISSP Training Guide  
               Computer Networks  
               Computer Networks and Internets  
               Guide to TCP/IP  
               Hack Attacks Denied   2nd   3rd  
               Hack Attacks Revealed  
               Hackers Beware  
               Hacking Exposed  
               Information Security Management Handbook  
               IP Fundamentals  
               Maximum Security, Third Edition  
               Network Security Private Communication in a Public World  
               Operating System Concepts  
               Planning for PKI  
               TCP/IP Illustrated  
       online
               IETF  
               ITU  
               NIST  
               RSA Security  
restoration procedures
       backup policies   2nd   3rd  
retaking
       exams  
retinal scans (biometrics)  
reverse social engineering  
Rijndael algorithm  
RIPEMD-160 Algorithm  
risk assessment
       security policy planning  
risk assesssment
       exam practice questions  
risk identification  
       assessment guidelines   2nd  
       assets inventory  
       Domain 5.0 skill set (operational/organizational security)  
       threat guidelines   2nd  
       vulnerability-scanning tools   2nd   3rd  
               application testing  
               blind testing  
               dial-up service testing  
               infrastructure testing  
               Internet service testing  
               knowledgable testing  
               network testing  
Rivest Cipher (RC2/RC4/RC5/RC6)
       symmetric key algorithm  
Rivest, Shamir & Adelman Encryption Algorithm (RSA)
       asymmetric key algorithm  
Role-Based Access Control (RBAC)  
       employee functions  
       lattice-based  
        task-based  
role-based access control model  
rollback strategies
       system modifications   2nd  
root CA model (Certificate Authorities)  
rotating
       tapes  
routers
       OSI Network layer  
       protocols
               Border Gateway Protocol (BGP)  
               Enhanced Interior Gateway Routing Protocol (EIGRP)  
               Exterior Gateway Protocol (EGP)  
               Interior Gateway Routing Protocol (IGRP)  
               Open Shortest Path First (OSPF)  
               Routing Information Protocol (RIP)  
       Rule-Based Access Control (RBAC)   2nd  
Routing Information Protocol (RIP)  
RSA Cryptography Standard
       PKCS document #1  
RSA encryption
       S/MIME email transmissions  
RSA Security Web site
       cryptographic resources  
       cryptography resources  
       PKCS resources  
Rule-Based Access Control (RBAC)
       router/firewall implementation   2nd  



Security+ Exam Cram 2 (Exam SYO-101)
Security+ Certification Exam Cram 2 (Exam Cram SYO-101)
ISBN: 0789729105
EAN: 2147483647
Year: 2005
Pages: 162

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net