Security+ Certification Exam Cram 2 (Exam Cram SYO-101)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

cabling

       coaxial

               10Base2 (thinnet)  

               10Base5 (thicknet)  

               security vulnerabilities  

               sheaths  

       fiber

               signal tapping elimination  

               transmission speeds  

       twisted-pair

               STP  

               UTP  

candidates

       ideal qualifications   2nd   3rd   4th   5th  

               educational background   2nd   3rd  

               hands-on experience   2nd   3rd   4th  

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CD)

       IEEE 802.11x standard  

CCNA Cisco Certified Network Associate Study Guide  

CD-Rs

       (recordable CDs)  

       destroying  

       dye colors  

cell phones

       wireless security

               VoIP (Voice over IP) technology  

centralized access control management   2nd  

centralized key management   2nd  

CERT Coordination Center Web site  

CERT Guide to System and Network Security Practices   2nd   3rd  

CERT Web site

       FTP exploits  

       Incident Report Guidelines Page  

certificate authorities (CAs)  

       ActiveX controls  

Certificate Authorities (CAs)

       digital certificates

               certificate policies   2nd  

               Certificate Practice Statements (CPS)   2nd  

               Certificate Revocation List (CRL)   2nd  

               common uses  

               example  

               function of  

               information elements   2nd  

certificate authorities (CAs)

       key escrow   2nd  

       Online Certificate Status Protocol (OCSP)  

Certificate Authorities (CAs)

       PKI implementation  

               cerficiate policies   2nd  

               Certificate Practice Statements (CPS)   2nd  

               Certificate Revocation List (CRL)   2nd  

               common uses  

               information elements   2nd  

               trust models   2nd   3rd  

                vendors  

certificate authorities (CAs)

       signed applets (Java)   2nd  

Certificate Enrollment Protocol (CEP)  

Certificate Management Protocol (CMP)  

certificate policies

       digital certificates   2nd  

       lifecycle components   2nd  

Certificate Practice Statement (CPS)

       certificate lifecycles   2nd  

Certificate Practice Statements (CPS)

       digital certificates   2nd  

Certificate Revocation List (CRL)  

       digital certificates   2nd  

               status checking  

certificates

       Domain 4.0 skill set (cryptography basics)   2nd  

certification

       career benefits of  

       exam development  

       vendor-neutrality  

Certification Magazine

       credentials survey  

Certification Request Syntax Standard

       PKCS document #10  

CGI

       (Common Gateway Interface)   2nd  

       script vulnerabilities

               buffer overflows  

               information leaks  

               profiling  

chain of custody (evidence)

       computer forensics   2nd  

Challenge Handshake Authentication Protocol (CHAP)

       Microsoft versions  

       on-demand mechanism  

       replay attacks  

change documentation   2nd  

       impact assessments   2nd  

chip-integrated smartcards

       authentication token  

ciphertext -only attacks  

circuit-level gateway

       proxy service firewalls  

CISSP Prep Guide  

CISSP Training Guide  

classes

       private IP addresses   2nd  

classifying

       data status

               confidential   2nd  

               secret   2nd  

               sensitive   2nd  

               top secret   2nd  

               unclassified   2nd  

clustering

       as business continuity element  

coaxial cable

       10Base2 (thinnet)  

       10Base5 (thicknet)  

       security vulnerabilities  

       sheaths  

Code Red worm  

Common Criteria Technology Security Evaluation  

communication security

       exam practice questions   2nd   3rd   4th   5th   6th   7th   8th  

Compact Wireless Application Protocol,   [See CWAP]2nd   [See CWAP]

compliance measures

       security policy planning  

CompTIA

       Web site

               exam resources  

CompTIA Web site

       exam training venues  

computer forensics  

       chain of custody   2nd  

       collection of evidence   2nd   3rd  

       preservation of evidence   2nd  

Computer Forensics Web site  

Computer Networks  

Computer Networks and Internets  

confidential data

       handling   2nd  

confidentiality

       encryption benefits   2nd  

cookies

       function of  

       privacy issues  

       session values   2nd  

copy backups

       disaster recovery  

copy backups (tapes)  

countermeasures

       IDS response  

Crack tool

       password guessing attacks  

Cram Session Web site

       exam practice resources  

critical services

       establishing   2nd  

cross-certification CA model (Certificate Authorities)  

Cryptographic Message Syntax Standard

       PKCS document #7  

Cryptographic Token Information Format Standard

       PKCS document #15  

Cryptographic Token Interface Standard

       PKCS document #11  

cryptography

       algorithms

               asymmetric key   2nd   3rd   4th   5th   6th   7th  

               function of  

                hashed   2nd   3rd   4th   5th   6th   7th  

               symmetric key   2nd  

               types  

       ancient origins  

       Certificate Enrollment Protocol (CEP)  

       Certificate Management Protocol (CMP)  

       chapter practice questions   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       Common Criteria for Information Technology Security Evaluation  

       encryption

               access control   2nd  

               authentication  

               bit strength  

               confidentiality   2nd  

               implementation guidelines   2nd  

               integrity   2nd   3rd   4th   5th   6th   7th  

               nonrepudiation   2nd   3rd  

       exam practice questions   2nd   3rd   4th   5th   6th   7th   8th   9th  

       Federal Information Processing Standard (FIPS)  

       Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)  

       Internet Protocol Security (IPSec)  

       Internet Security Association and Key Management Protocol (ISAKMP)  

       ISO 17799  

       ISO 17799 (Code of Practice for Information Security)   2nd   3rd  

       mechanical  

       online resources

               How Stuff Works Web site  

               IETF Web site   2nd  

               ITU Web site  

               Microsoft Kerberos Web site  

               NIST Web site   2nd  

               RSA Security Web site   2nd  

               W3C Web site  

       PKCS

               Certification Request Syntax Standard  

               Cryptographic Message Syntax Standard  

               Cryptographic Token Information Format Standard  

               Cryptographic Token Interface Standard  

               development by RSA Laboratories  

               Diffie-Hellman Key Agreement  

               Elliptic Curve Cryptography Standard  

               Extended-Certificate Syntax Standard  

               Password-Based Cryptography Standard  

               Personal Information Exchange Syntax Standard  

               Private Key Information Syntax Standard  

               Pseudo Random Generator  

               RSA Cryptography Standard  

       Pretty Good Privacy (PGP)  

       Secure Multipurpose Internet Mail Extensions (S/MIME)  

       Secure Sockets Layer (SSL)  

       Transport Layer Security (TLS)  

       Wired Equivalent Privacy (WEP)  

       Wireless Transport Layer Security (WTLS)  

       X.509 PKI infrastructure  

       X.509 standards  

               required fields   2nd  

               Version 1  

               Version 2  

               Version 3  

       XML Key Management Specification (XKMS)  

CWAP

       (Compact Wireless Application Protocol)   2nd  

Категории