[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] VeriSign certificate/registration authority virtual local area networks, [See VLANs]2nd [See VLANs] Virtual Network Computing (VNC) as tool in back door attacks virtual private networks, [See VPNs]2nd [See VPNs] Virus Bulletin Web site viruses (malicious code) boot-sector famous I Love You Melissa Michelangelo Stoned hoaxes macro McAfee Security Antivirus Web site polymorphic Sophos Antivirus Web site Symantec Antivirus Web site Virus Bulletin Web site VLANs (virtual local area networks) 2nd benefits Q-tag mechanism 2nd tagging (IEEE 802.1Q standard) 2nd UC Davis Web site Voice over IP (VoIP) versus PBX telecom systems 2nd voiceprint scans (biometrics) VoIP (Voice over IP) protocol VPNs (virtual private networks) 2nd advantages/disadvantages connection authentication (IPSec) 2nd 3rd 4th 5th L2TP implementation 2nd 3rd 4th PPTP implementation 2nd 3rd 4th tunneling security configuration vulnerabilities exam practice questions risk identification tools 2nd 3rd vulnerability scanners Nessus NetRecon Nmap SAFEsuite SAINT SATAN Tiger Tools TigerSuite |