Security+ Certification Exam Cram 2 (Exam Cram SYO-101)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

back door programs

       (attack tool)  

       attack prevention   2nd  

       Back Orifice  

       NetBus  

       PCAnywhere  

       Sub7  

       Terminal Services  

       Virtual Network Computing (VNC)  

Back Orifice program

       back door attacks  

backups

       disaster recovery plans   2nd  

               copy backups  

               differential backups  

               full backups  

               incremental backups  

               restoration procedures   2nd   3rd  

               strategy selection   2nd  

       handling   2nd  

       policies

               development guidelines   2nd  

       storage of   2nd  

       tapes

               copy backup method  

               differential backup method  

               frequency of  

               full backup method  

               incremental backup method  

Badtrans worm  

baselines (security)

       establishing   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th  

       exam practice questions   2nd   3rd  

       hardening measures

               applications   2nd  

               networks   2nd   3rd  

               operating systems   2nd   3rd   4th  

               services   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

bastion hosts

       role of  

bastion-host firewall  

behavior-based IDS  

       common features  

       limitations   2nd  

biometric authentication   2nd  

biometrics

       facility security  

       technologies

               facial geometry  

                fingerprints  

               hand/plam geometry  

               iris profiles  

               retinal scans  

               signatures  

               voiceprints  

birthday attacks (password guessing)  

bit strength

       encryption measurements  

bit strengths

       symmetric versus asymmetric key algorithms   2nd  

blind access

       FTP server vulnerability  

blind testing

       vulnerability scanning  

block ciphers

       symmetric key algorithms  

Blowfish Encryption Algorithm

       symmetric key algorithm  

Blowfish encyrption

       SSH utility  

Bluetooth standard

       wireless security vulnerabilities  

Boink attack (DoS)  

Bonk attack (DoS)  

book references

       CCNA Cisco Certified Network Associate Study Guide  

       CERT Guide to System and Network Security Practices   2nd   3rd  

       CISSP Prep Guide  

       CISSP Training Guide  

       Computer Networks  

       Computer Networks and Internets  

       Guide to TCP/IP  

       Hack Attacks Denied   2nd   3rd  

       Hack Attacks Revealed  

       Hackers Beware  

       Hacking Exposed  

       Information Security Management Handbook  

       IP Fundamentals  

       Maximum Security, Third Edition  

       Network Security Private Communication in a Public World  

       Operating System Concepts  

       Planning for PKI  

       TCP/IP Illustrated  

boot-sector viruses  

bridge CA model (Certificate Authorities)  

brute force attacks (password guessing)  

       prevention measures  

buffer overflows

       attack scenarios   2nd  

       CGI script vulnerability  

       LDAP vulnerability  

       potential damage   2nd  

       software exploitation attacks  

business continuity

       Domain 5.0 skill set (operational/organizational security)  

businesses

       continuity plan elements  

               clustering  

               connectivity  

               facilities  

               fault tolerance  

Категории