Index S

[A] [B] [C] [D] [E] [F] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

SA (Security Association)  
SA (security association)  
SAFE architecture   2nd   3rd  
       exam prep questions   2nd   3rd   4th   5th   6th   7th   8th   9th  
       information assets   2nd   3rd   4th   5th   6th   7th   8th  
       location assets   2nd   3rd   4th  
SAFE Blueprint  
       Enterprise model   2nd  
               axioms   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
               design   2nd  
       exam prep questions   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
       modular approach   2nd   3rd   4th   5th  
               campus modules   2nd   3rd   4th   5th  
               edge modules   2nd   3rd   4th   5th   6th   7th   8th   9th  
       philosophy of  
       SMR  
               design   2nd   3rd   4th   5th  
       VPN   2nd  
               design   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  
       wireless  
               design   2nd  
scans
       ports   2nd  
scores, exams  
script kiddies  
Secure Shell protocol (SSH)  
Secure stage (security wheel)   2nd  
security
       cost/protection tradeoffs   2nd  
       NTP   2nd  
       PIX firewalls  
               IPSec   2nd   3rd  
               NAT   2nd  
               traffic segregation   2nd  
       policies   2nd  
               acceptable use  
               assets  
                audits   2nd  
               authorities   2nd  
               Enterprise SAFE model  
               Enterprise SAFE model.   [See also Enterprise SAFE model]
               exam prep questions   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
               example of   2nd   3rd   4th   5th   6th   7th  
               icident response  
               Improve stage (security wheel)  
               Monitor stage (security wheel)   2nd  
               revisions  
               risks   2nd  
               Secure stage (security wheel)   2nd  
               security wheel   2nd  
               technologies  
               Test stage (security wheel)  
               threats  
       routers
               campus networks   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
       SAFE architecture   2nd   3rd  
               exam prep questions   2nd   3rd   4th   5th   6th   7th   8th   9th  
               information assets   2nd   3rd   4th   5th   6th   7th   8th  
               location assets   2nd   3rd   4th  
       small networks
               assets   2nd  
               design   2nd  
               devices   2nd   3rd   4th  
               mitigating threats   2nd  
               threats   2nd   3rd   4th  
       SMR  
               design   2nd   3rd   4th   5th  
       switches  
               securing access   2nd  
               securing management/services  
               securing ports  
       threats  
               exam prep questions   2nd   3rd   4th   5th   6th   7th   8th  
               external   2nd   3rd  
               internal   2nd   3rd   4th  
               mitigating.   [See also whitepapers]
               reconnaissance   2nd   3rd   4th   5th   6th   7th   8th  
               types of  
               unauthorized access   2nd   3rd   4th   5th  
       VPN   2nd  
               design   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  
       wireless  
               design   2nd  
Security Association (SA)  
security association (SA)  
segregation
       traffic   2nd  
Server module   2nd  
servers
       AAA  
       CS ACS   2nd   3rd  
       small networks  
               assets   2nd  
               branches/standalone organizations  
               Campus module   2nd   3rd   4th   5th   6th   7th   8th  
               design   2nd  
               devices   2nd   3rd   4th  
               mitigating threats   2nd  
               threats   2nd   3rd   4th  
service password-encryption command  
services
       routers
               securing   2nd   3rd   4th  
serviecs
       switches
               securing  
session replay  
sessions
       Flash Review mode
               starting  
       Practice Exam mode
               starting   2nd  
       TFTP   2nd  
Simple Network Management Protocol (SNMP)   2nd   3rd  
       configuring   2nd  
       versions  
single-purpose devices, VPNs  
small networks  
       assets   2nd  
       branches/standalone organizations  
       Campous module   2nd   3rd   4th   5th   6th   7th   8th  
       design   2nd  
       devices   2nd   3rd   4th  
       exam prep questions   2nd   3rd   4th   5th   6th   7th   8th   9th  
       mitigating threats   2nd  
       threats   2nd   3rd   4th  
SMR
       exam prep questions   2nd   3rd   4th   5th  
SMR (small, midsize, and remote user networks)
       SAFE Blueprint   2nd  
               design   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
SMR Blueprint
       remote user options  
               accessing software  
               hardware VPN clients  
               implementing firewalls   2nd   3rd  
               remote site broadband routers   2nd  
sniffers
       packets   2nd   3rd  
SNMP (Simple Network Management Protocol)  
SNMP (Simple Network Mangement Protocol)   2nd  
       configuring   2nd  
       versions  
social engineering  
software
       3002 VPN Software Client   2nd  
       access
               remote users  
       assets   2nd  
       PrepLogic Practice Exams, Preview Edition   2nd  
               applying   2nd   3rd   4th  
               deleting  
               exam simulation   2nd  
               installing  
               interface  
               learning environment   2nd  
               question quality  
               software requirements  
spies  
split tunneling   2nd  
       exam prep questions   2nd  
spoofing IP addresses  
SSH (Secure Shell protocol)  
standalone organizations
       small networks  
starting
       Flash Review mode  
       Practice Exam mode   2nd  
stratum  
sweeps
       ping   2nd  
switches
       as targets   2nd   3rd   4th  
       campus networks  
               securing access   2nd  
               securing management/services  
               securing ports  
       NTP
               configuring   2nd  
       SNMP  



CSI Exam Cram 2 (Exam 642-541)
CCSP CSI Exam Cram 2 (Exam Cram 642-541)
ISBN: 0789730243
EAN: 2147483647
Year: 2002
Pages: 177
Authors: Annlee Hines

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net