Index I

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

       message numbers   2nd  
       ping traffic
               allowing in (access-list command)  
               allowing in (conduit command)  
icmp command
       options   2nd  
       (intrusion detection system)  
       additional resources  
       attack monitoring  
       exam prep questions   2nd   3rd   4th   5th   6th  
               full systems  
               PIX firewalls  
       shun command  
               attack   2nd   3rd  
               disabling from audit policies  
               false positives  
               global audit policies  
               informational   2nd   3rd  
               specific audit policies  
IDS; PIX firewall
       dynamic shunning  
       (Internet Key Exchange)   2nd   3rd   4th   5th   6th   7th   8th  
       VPN connections
               configuring (IPSec)   2nd   3rd   4th   5th   6th   7th   8th  
       PDM software
               PDM installations   2nd  
       TFTP servers
               copying to PIX firewall   2nd   3rd  
               overview   2nd  
               upgrading to PIX firewall  
               upgrading to PIX firewall (monitor mode)   2nd   3rd  
inactivity timeouts  
inbound traffic
       PIX firewalls
               setting up   2nd   3rd  
informational signatures (IDS)   2nd  
       actions Web site  
inside interface (trusted area)
       PIX firewall  
       Cisco Secure Access Control Server (CSACS)   2nd  
               3DES activation  
               DES activation  
               HTTP server configuration   2nd  
               IP address configuration  
               PDM image uploads   2nd  
               saving PDM image to TFTP servers  
       PrepLogic Practice Exams, Preview Edition  
interface command  
       PIX firewall configuration   2nd   3rd  
interface tests
               ARP test  
               network activity  
               NIC status test  
               ping test  
       PIX firewalls
internal buffers
       logging on PIX firewall  
internal IP addresses
       port redirection   2nd  
internal threats  
internal-to-global mapping (NAT)  
Internet Key Exchange (IKE)
Internet Protocol Security,   [See IPSec]
intranet VPNs  
intrusion detection system,   [See IDS]
               fragment attacks   2nd  
ip address command  
       DHCP clients   2nd  
IP address command
       PIX firewall configuration  
ip address command
IP addresses
               PDM installations  
       exam prep questions   2nd   3rd   4th   5th   6th  
       external to internal
               port redirection   2nd  
       inbound traffic
               PIX firewall configuration   2nd   3rd  
       NAT mapping table   2nd  
       NAT overloading  
       outbound traffic
               PIX firewall configuration   2nd   3rd   4th   5th   6th   7th   8th   9th  
               address table   2nd  
       translation slots  
               NAT/PAT implementation   2nd  
ip local pool command  
       (Internet Protocol Security)  
       additional resources  
       anti-replay   2nd  
               pre-shared keys  
               RSA encrypted nonces  
               RSA signatures  
               security association (SA)  
       authentication headers (AH)  
       data confidentiality   2nd  
       data integrity   2nd  
       data origin authentication   2nd  
       Diffie-Hellman algorithm  
       Encapsulation Secure Payload (ESP)   2nd  
               Advanced Encryption Standard (AES)  
               Data Encryption Standard (DES)  
               Triple Data Encryption Standard (3DES)  
       exam prep questions   2nd   3rd   4th   5th   6th   7th  
       Internet Key Exchange (IKE)  
       Network layer (OSI model)   2nd  
       Phase 1
               peer connections   2nd   3rd   4th  
       Phase 2
               peer connections   2nd   3rd   4th  
       security associations (SA)
               creating between peers   2nd   3rd   4th   5th   6th  
       site-to-site VPN connections
               configuring   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th  
       testing   2nd  
       troubleshooting   2nd  
       VPN implementation  
               encryption   2nd   3rd   4th  
               hashing   2nd   3rd   4th  
               keys   2nd   3rd  
isakmp enable command  
isakmp identity command  
isakmp key command   2nd  
isakmp policy command   2nd  

CSPFA Exam Cram 2 (Exam 642-521)
CCSP CSPFA Exam Cram 2 (Exam Cram 642-521)
ISBN: 0789730235
EAN: 2147483647
Year: 2003
Pages: 218 © 2008-2017.
If you may any questions please contact us: