Security+ Certification Exam Cram 2 (Exam Cram SYO-101)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

radio frequency (RF) interference

       wireless networks   2nd  

RADIUS

       (Remote Authentication Dial-In User Service)   2nd  

       remote dial-up authentication issues   2nd  

RAID

       (Redundant Array of Inexpensive Disks)  

RAID (Redundant Array of Inexpensive Disks)  

RC4 encryption

       wireless networks  

recovered key pairs

       digital certificates  

registration authorities (RAs)  

remote access

       802.11x wireless networking   2nd  

               clear-text data transmission  

               man-in-the-middle attacks  

               radio traffic detection  

               session hijacking  

               war chalking  

               war driving  

       dial-up authentication

               RADIUS   2nd   3rd   4th  

               TACACS   2nd   3rd  

               TACACS+   2nd  

       Domain 2.0 skill set (communication security)  

       networks

               hardening measure  

       packet-level authentication

               IPSec   2nd   3rd   4th   5th  

       SSH connections  

               Blowfish encryption  

               DES encryption  

               IDEA encryption  

               scp utility  

                slogin utility  

       SSL interface  

       VPNs

               L2TP implementation   2nd   3rd   4th  

               PPTP implementation   2nd   3rd   4th  

remote access policies  

Remote Access Service (RAS)

       security controls   2nd  

Remote Authentication Dial-In User Service,   [See RADIUS]2nd   [See RADIUS]

removable media

       CD-Rs (recordable CDs)  

               destroying  

               dye colors  

       data disposal methods

               declassification  

               degaussing  

               destruction  

               overwriting  

                sanitization  

       discard methods

               declassification  

               degaussing  

               destruction  

               overwriting  

               sanitization  

       flashcards

               device usage  

               information discard options  

       floppy disks

               storage guidelines  

       hard drives

               storage guidelines  

       security risks   2nd  

       smartcards

               device usage  

               information discard options  

               integrated circuit cards (ICCs)  

               stored value type  

       tape  

               AIT (Advanced Intelligent Tape)  

               copy backups  

               DAT (Digital Audio Tape)  

               differential backups  

               DLT (Digital Linear Tape)  

               full backups  

               incremental backups  

               QIC (Quarter Inch Cartridge)  

               rotation methods  

               storage requirements   2nd  

               Super DLT (Digital Linear Tape)  

               Travan  

removing

       protocols

               from servers  

       services

               from servers  

renewed digital certificates  

replay attacks

       Challenge Handshake Authentication Protocol (CHAP)  

       packet sniffer usage  

required services

       establishing   2nd  

resources

       books

               CCNA Cisco Certified Network Associate Study Guide  

               CERT Guide to System and Network Security Practices   2nd   3rd  

               CISSP Prep Guide  

               CISSP Training Guide  

               Computer Networks  

               Computer Networks and Internets  

               Guide to TCP/IP  

               Hack Attacks Denied   2nd   3rd  

               Hack Attacks Revealed  

               Hackers Beware  

               Hacking Exposed  

               Information Security Management Handbook  

               IP Fundamentals  

               Maximum Security, Third Edition  

               Network Security Private Communication in a Public World  

               Operating System Concepts  

               Planning for PKI  

               TCP/IP Illustrated  

       online

               IETF  

               ITU  

               NIST  

               RSA Security  

restoration procedures

       backup policies   2nd   3rd  

retaking

       exams  

retinal scans (biometrics)  

reverse social engineering  

Rijndael algorithm  

RIPEMD-160 Algorithm  

risk assessment

       security policy planning  

risk assesssment

       exam practice questions  

risk identification  

       assessment guidelines   2nd  

       assets inventory  

       Domain 5.0 skill set (operational/organizational security)  

       threat guidelines   2nd  

       vulnerability-scanning tools   2nd   3rd  

               application testing  

               blind testing  

               dial-up service testing  

               infrastructure testing  

               Internet service testing  

               knowledgable testing  

               network testing  

Rivest Cipher (RC2/RC4/RC5/RC6)

       symmetric key algorithm  

Rivest, Shamir & Adelman Encryption Algorithm (RSA)

       asymmetric key algorithm  

Role-Based Access Control (RBAC)  

       employee functions  

       lattice-based  

        task-based  

role-based access control model  

rollback strategies

       system modifications   2nd  

root CA model (Certificate Authorities)  

rotating

       tapes  

routers

       OSI Network layer  

       protocols

               Border Gateway Protocol (BGP)  

               Enhanced Interior Gateway Routing Protocol (EIGRP)  

               Exterior Gateway Protocol (EGP)  

               Interior Gateway Routing Protocol (IGRP)  

               Open Shortest Path First (OSPF)  

               Routing Information Protocol (RIP)  

       Rule-Based Access Control (RBAC)   2nd  

Routing Information Protocol (RIP)  

RSA Cryptography Standard

       PKCS document #1  

RSA encryption

       S/MIME email transmissions  

RSA Security Web site

       cryptographic resources  

       cryptography resources  

       PKCS resources  

Rule-Based Access Control (RBAC)

       router/firewall implementation   2nd  

Категории