Security+ Certification Exam Cram 2 (Exam Cram SYO-101)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

M of N control

       key backups  

MAC

       (Mandatory Access Control)   2nd  

       sensitivity labels   2nd  

MAC addresses

       switch functions  

macro viruses  

Mail-Abuse.org Web site  

malicious code

       (malware)  

       Domain 1.0 skill set (general security concepts)  

       logic bombs  

       protection measures   2nd  

       Trojan horses  

               Acid Rain  

               Simpsons  

               Trojan.W32.Nuker  

       viruses  

               boot-sector  

                hoaxes  

               I Love You  

               macro  

               Melissa  

               Michelangelo  

               polymorphic  

               Stoned  

       worms  

               Badtrans  

               Code Red  

               Morris  

               Nimda  

malware,   [See malicious code]

man-in-the-middle attacks  

       Hunt tool  

       Juggernaut tool  

       mutual authentication  

       T-Sight tool  

       WLANs  

Mandatory Access Control (MAC)  

Mandatory Access Control,   [See MAC]2nd   [See MAC]

mantraps

       facility security  

mathematical attacks

        ciphertext -only  

       plaintext  

Maximum Security, Third Edition  

McAfee Security Antivirus Web site  

MeasureUp Web site

       exam practice resources  

mechanical cryptography  

media

       coaxial cable

               10Base2 (thinnet)  

               10Base5 (thicknet)  

               security vulnerabilities  

               sheaths  

       Domain 3.0 skill set (infrastructure security)  

       fiber cabling

               signal tapping elimination  

               transmission speeds  

       removable

               CD-Rs (recordable CDs)   2nd   3rd  

               declassification  

               degaussing  

               destruction  

               flashcards   2nd  

               floppy disks  

               hard drives  

               overwriting  

                sanitization  

               security risks   2nd  

               smartcards   2nd   3rd   4th  

               tape   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th  

       twisted-pair cable

               STP  

               UTP  

Melissa virus  

Message Digest Series Algorithm (MD2/MD4/MD5)   2nd  

Michelangelo virus  

Microsoft Kerberos Web site

       cryptographic resources  

Microsoft Press Web site  

Microsoft TechNet Web site  

Microsoft Training and Certification Web site  

moats

       facility security  

mobile devices

       security measures  

modems

       gradual replacement of  

       primary users  

       Remote Access Service (RAS)

               security controls   2nd  

       war-dialing attacks

               preventing   2nd  

monitoring

       system modifications

               software/hardware impact assessments   2nd  

Morris worm  

MP3 audio files

       unauthorized file sharing via FTP   2nd  

multifactor authentication  

multiple key pairs  

mutual authentication

       man-in-the-middle attacks  

Категории