Security+ Certification Exam Cram 2 (Exam Cram SYO-101)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

I Love You virus  

i-Mode standard

       security vulnerabilities   2nd  

IDEA

       (International Data Encryption Algorithm)  

       SSH utility  

identifying

       nonessential services   2nd   3rd   4th   5th   6th   7th   8th   9th  

       risks  

               assessment guidelines   2nd  

               assets inventory  

               threat assessments   2nd  

               vulnerability-scanning tools   2nd   3rd  

IDSs

       (intrusion detection systems)  

       (intrusion-detection systems)   2nd  

       attack signatures  

        bastion hosts

               role of  

       behavior-based  

               common features  

               limitations   2nd  

       exam practice questions   2nd   3rd   4th   5th   6th  

       honeynets

               function of  

       honeypots

               function of  

       host-based   2nd  

               strengths   2nd   3rd  

       incident handling responses

               countermeasures  

                deflection  

               detection  

       Intrusion Countermeasure Equipment (ICE)  

       knowledge-based  

               known attack signatures  

               limitations   2nd  

       layered approach  

       network-based   2nd  

               header signatures  

               port signatures  

               strengths   2nd   3rd  

               string signatures  

       versus intrusion-prevention systems  

IEEE 802.11 standards

       wireless devices  

IEEE 802.11x standard

       Carrier Sense Multiple Access with Collsion Avoidance (CSMA/CA)  

       current specifications  

       wireless vulnerabilities  

IEEE 802.11x wireless networks

       remote access issues   2nd  

               clear-text data transmission  

               man-in-the-middle attacks  

               radio traffic detection  

               session hijacking  

               war chalking  

               war driving  

IEEE 802.1Q standard

       VLAN tagging   2nd  

IEEE Standards Association Web site  

IETF Web site

       cryptographic resources  

       cryptography resources  

incident handling responses (IDSs)

       countermeasures  

       deflection  

       detection  

incident response

       security policy planning  

incremental backups

       disaster recovery  

incremental backups (tapes)  

information leaks

       CGI script vulnerability  

Information Security Management Handbook  

InformIT Web site

       computer security resources  

infrastructure security

       exam practice questions   2nd   3rd   4th   5th   6th   7th  

       FAQS.org Web site  

       Invir.com Web site  

       NIST Web site  

       UC Davis Web site  

infrastructure security,   [See also devices]

infrastructure testing

       vulnerability scanning  

instant messaging

       products  

       vulnerabilities

                file-sharing systems   2nd  

               packet-sniffing   2nd  

integrity

       encryption benefits   2nd   3rd   4th   5th   6th  

intergrated circuit cards (ICCs)  

Interior Gateway Routing Protocol (BGP)  

Interior Gateway Routing Protocol (IGRP)  

internal motion detectors

       facility security  

International Data Encryption Algorithm (IDEA)

       symmetric key algorithm  

International Telecommunications Union (ITU)

       X.509 standards  

Internet Control Message Protocol (ICMP)

       port scans  

Internet Engineering Task Force

       X.509-based PKI  

Internet Key Exchange (IKE) protocol   2nd  

Internet Protocol Security (IPSec)  

Internet Protocol Security,   [See IPSec]

Internet Security Association and Key Management Protocol (ISAKMP)  

Internet service testing

       vulnerability scanning  

intranets

       security configuration  

Intrusion Countermeasure Equipment (ICE)  

intrusion detection

       Domain 3.0 skill set (infrastructure security)  

intrusion detection systems,   [See IDSs]

intrusion-detection systems,   [See IDSs]2nd   [See IDSs]

intrusion-prevention systems

       versus IDSs  

Invir.com Web site  

IP addresses

       private

               Automatic Private IP Addressing (APIPA)  

       spoofing attacks   2nd  

IP addressing

       private

               network address translation (NAT)   2nd  

IP Fundamentals  

IPConfig utility

       diagnostic functions  

IPSec

       (Internet Protocol Security)  

       Internet Key Change (IKE) protocol   2nd  

       Network layer (OSI model)   2nd  

       VPN connection authentication   2nd   3rd   4th  

               Authentication Header (AH)  

               Encapsulating Security Payload (ESP)  

iris profiles (biometrics)  

ISAKMP

       (Internet Security Association and Key Management Protocol)  

ISO 17799 standard  

ISO 17799 standard (Code of Practice for Information Security)   2nd   3rd  

ISPs

       VPN connectivity  

ITU Web site

       cryptography resources  

Категории