Security+ Certification Exam Cram 2 (Exam Cram SYO-101)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Hack Attacks Denied   2nd   3rd  

Hack Attacks Revealed  

hackers

       war driving (wireless networks)  

Hackers Beware  

Hacking Exposed  

hand/palm geometry (biometrics)  

hard drives

       storage guidelines  

hardening

       applications

               updates/patches  

       networks

               access control   2nd  

               disabling unnecessary protocols/services   2nd  

               firewalls  

               guidelines  

               hardware updates  

               remote access control  

               software updates  

       operating systems

               guidelines   2nd  

       services

               data respositories  

               DHCP servers  

               DNS servers  

               email servers  

               file servers   2nd  

               FTP servers  

               NNTP servers  

               print servers   2nd  

               Web servers  

hardware

       architectural documentation  

       change documentation

               impact assessments   2nd  

       updates

               network hardening measure  

hash algorithms

       Message Digest Series Algorithm (MD2/MD4/MD5)   2nd  

       Message RIPEMD-160  

hash algotihms   2nd  

       Secure Hash Algorithm (SHA/SHA-1)   2nd  

header signatures

       network-based IDS  

hierarchical CA model (Certificate Authorities)  

highjacking attacks  

hoaxes (email)  

Honeynet.org Web site  

honeynets (IDS)

       function of  

honeypots (IDS)

       function of  

host-based IDS

       strengths   2nd   3rd  

host-based IDSs   2nd  

How Stuff Works Web site

       cryptographic resources  

HTTP

       (Hypertext Transfer Protocol)  

       TCP port 80  

       versus HTTPS  

HTTPS

       (Hypertext Transfer Protocol over Secure Sockets Layer)  

       encryption levels  

       port designation  

human resources

       security policy planning  

Hunt tool

       man-in-the-middle attacks  

Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)  

Hypertext Transfer Protocol over Secure Sockets Layer,   [See HTTPS]

Hypertext Transfer Protocol,   [See HTTP]

Категории