Index V

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

VeriSign
       certificate/registration authority  
virtual local area networks,   [See VLANs]2nd   [See VLANs]
Virtual Network Computing (VNC)
       as tool in back door attacks  
virtual private networks,   [See VPNs]2nd   [See VPNs]
Virus Bulletin Web site  
viruses
       (malicious code)  
       boot-sector  
       famous
               I Love You  
               Melissa  
               Michelangelo  
               Stoned  
        hoaxes  
       macro  
       McAfee Security Antivirus Web site  
       polymorphic  
       Sophos Antivirus Web site  
       Symantec Antivirus Web site  
       Virus Bulletin Web site  
VLANs
       (virtual local area networks)   2nd  
       benefits  
       Q-tag mechanism   2nd  
       tagging (IEEE 802.1Q standard)   2nd  
       UC Davis Web site  
Voice over IP (VoIP)
       versus PBX telecom systems   2nd  
voiceprint scans (biometrics)  
VoIP (Voice over IP) protocol  
VPNs
       (virtual private networks)   2nd  
       advantages/disadvantages  
       connection authentication (IPSec)   2nd   3rd   4th   5th  
       L2TP implementation   2nd   3rd   4th  
       PPTP implementation   2nd   3rd   4th  
       tunneling  
               security configuration  
vulnerabilities
       exam practice questions  
       risk identification
               tools   2nd   3rd  
vulnerability scanners  
       Nessus  
       NetRecon  
       Nmap  
       SAFEsuite  
       SAINT  
       SATAN  
       Tiger Tools TigerSuite  



Security+ Exam Cram 2 (Exam SYO-101)
Security+ Certification Exam Cram 2 (Exam Cram SYO-101)
ISBN: 0789729105
EAN: 2147483647
Year: 2005
Pages: 162

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net