Security+ Certification Exam Cram 2 (Exam Cram SYO-101)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

S/FTP

       (FTP with SSL encapsulation)  

S/MIME

       (Secure Multipurpose Internet Mail Extension)  

       email data transmission  

SAFEsuite scanner  

SAINT scanner

       ( Security Administrator's Integrated Network Tool)  

SAINT Web site

       FTP vulnerability resources  

sanitization

       removable media discard method  

sanitizing

       data  

SANS.org Web site

       Information Security Reading Room   2nd  

       top 20 security vulnerabilities  

       vulnerabilities list  

SATAN scanner

       (Security Administrator's Tool for Analyzing Networks)  

scanners (vulnerability)  

       Nessus  

       NetRecon  

       Nmap  

       SAFEsuite  

       SAINT  

       SATAN  

       Tiger Tools TigerSuite  

scoring

       exams  

scp function (SSH utility)  

screened host gateways   2nd  

screened subnet gateways   2nd  

secret data

       handling   2nd  

Secure Hash Algorithm (SHA/SHA-1)   2nd  

Secure Multipurpose Internet Mail Extension,   [See S/MIME]

Secure Multipurpose Internet Mail Extensions (S/MIME)  

Secure Shell utility,   [See SSH utility]

Secure Sockets Layer,   [See SSL]2nd   [See SSL]

SecurID token (RSA Security)  

security

       topologies  

                bastion -host firewall  

               screened host gateways   2nd  

               screened subnet gateways   2nd  

security baselines

       Domain 3.0 skill set (infrastructure security)   2nd  

security policies

       auditing

               developing   2nd  

       disaster recovery plans

               acceptable use  

               compliance  

               disposal/destruction  

               due care  

               human resources  

               incident reponse  

               password management  

               privacy  

               risk assessment  

               separation of duties  

       Domain 5.0 skill set (operational/organizational security)   2nd  

       exam practice questions  

security topologies

       Domain 3.0 skill set (infrastructure security)  

Security+ Exam,   [See exams (Exam (SY0-101)]

selecting

       backup strategies

               disaster recovery   2nd  

self-assessment

       candidate qualifications   2nd   3rd   4th   5th  

               educational background   2nd   3rd  

               hands-on experience   2nd   3rd   4th  

       exam-readiness

               testing   2nd   3rd  

       overview   2nd  

sensitive data

       handling   2nd  

sensitivity labels (MAC)   2nd  

separation of duties

       security policy planning  

server security policies  

servers

       attack vulnerabilities  

       FTP

               vulnerabilities   2nd   3rd   4th   5th   6th   7th  

       protocols

               removing  

       required protocols

               determining   2nd  

       roles

               application  

               email  

               establishing   2nd  

               file  

               FTP  

               logon  

               network services  

               news  

               print  

               Use (NNTP)  

               Web  

       security measures

               RAID (Redundant Array of Inexpensive Disks)  

               uninterruptible power supply (UPS)  

       services

               removing  

services

       critical

               establishing   2nd  

       data repositories

               hardening measures  

       DHCP services

               hardening measures  

       DNS services

               hardening measures  

       email services

               hardening measures  

       file services

               hardening measures   2nd  

       FTP services

               hardening measures  

       NTTP services

               hardening measures  

       print services

               hardening measures   2nd  

       required

               establishing   2nd  

       servers

               removing  

       Web services

               hardening measures  

session hijacking attacks

       WLANs  

shielding

       Faraday cage   2nd  

       TEMPEST (Transient Electromagnetic Pulse Emanation Standard)  

shoulder surfing attacks  

signatures (biometrics)  

signed applets (Java)   2nd  

Simple Mail Transport Protocol,   [See SMTP]2nd   [See SMTP]

Simple Network Management Protocol,   [See SNMP]2nd   [See SNMP]

Simpsons (Trojan horse)  

single sign-on (SSO)

       access control measure   2nd  

site surveys

       wireless networks

               poor planning   2nd  

               protection measures  

skill sets (exams)

       Domain 1.0 (general security concepts)  

               access control  

               attacks  

               auditing  

               authentication  

               malicious code  

               social engineering  

       Domain 2.0 (communication security)  

               directories  

               email  

               file transfers  

               remote access  

               Web data transmission  

               wireless networks  

       Domain 3.0 (infrastructure security)  

               devices   2nd  

               intrusion detection  

               media  

               security baselines   2nd  

               security topologies  

       Domain 4.0 (cryptography basics)  

               algorithms  

               certificate lifecycles   2nd  

               key management   2nd  

               PKI  

               standards/protocols  

       Domain 5.0 (operational/organizational security)  

               business continuity  

               disaster recovery  

               documentation  

               education  

               forensics  

               physical security  

               privilege management  

               risk identification  

               security policies   2nd  

       weighted scoring averages   2nd  

slogin function (SSH utility)  

smartcards

       device usage  

       information discard options  

       integrated circuit cards (ICCs)  

       stored value type  

SMTP

       (Simple Mail Transport Protocol)   2nd  

       Relay agents

                spamming attacks   2nd  

Smurf attack (DoS)  

Sniffer Wireless

       WLAN monitoring tool  

sniffers

       replay attacks  

SNMP

       (Simple Network Management Protocol)   2nd  

       security measures   2nd  

       TCP/IP statistics   2nd  

       versions   2nd  

social engineering

        attackers

               common tactics   2nd  

       common examples   2nd  

       Domain 1.0 skill set (general security concepts)  

       management training  

       reverse  

       scenarios   2nd   3rd  

       tiger teams

               vulnerability testing  

        user training  

software

       architectural documentation  

       change documentation

               impact assessments   2nd  

       updates

               network hardening measure  

software exploitation attacks  

software requirements

       PrepLogic Practive Tests  

Sophos Antivirus Web site  

spam

       Web sites

               Mail-Abuse.org  

               Spam Primer  

spam (email)

       handling   2nd  

        open SMTP relays   2nd  

Spam Primer Web site  

spoofing

       IP addresses   2nd  

SSH protocol

       as alternative to Telnet protocol  

SSH utility

       (Secure Shell)  

               Blowfish encryption  

               DES encryption  

               IDEA encryption  

       remote access issues  

               Blowfish encryption  

               DES encryption  

               IDEA encryption  

               scp function  

               slogin function  

SSH.com Web site  

SSL

       (Secure Sockets Layer)  

       (Secure Sockeys Layer)  

       asymmetric key communication  

       cipher strengths  

       Linux Slapper worm  

       protocol vulnerabilities   2nd  

       remote access issues  

       stateful connections  

standards

       Domain 4.0 skill set (cryptography basics)   2nd   3rd   4th   5th  

stateful-inspection firewalls  

Stoned virus  

stored value smartcards  

STP ( shielded twisted-pair) cable

       security vulberabilities  

stream ciphers

       symmetric key algorithms  

string signatures

       network-based IDS  

Sub7 program

       back door attacks  

SubSeven program

       back door attacks  

Super Digital Linear Tape (DLT)  

Super DLT (Digital Linear Tape)  

suspended digital certificates  

switches

       frame filtering  

       loop prevention  

       MAC addresses  

       OSI Data Link layer  

Symantec Antivirus Web site  

symmetric key algorithms  

       Advanced Encryption Standard (AES)  

       block ciphers  

       Blowfish Encryption Algorithm  

       comparison chart   2nd  

       Data Encryption Standard (DES)  

       International Data Encryption Algorithm (IDEA)  

       Rivest Cipher (RC2/RC4/RC5/RC6)  

       stream ciphers  

       Triple Data Encryption Standard (3DES)  

       versus asymmetric key algorithms

               bit strength   2nd  

symmetric keys

       Kerberos authentication   2nd  

               process   2nd  

SYN flood attack (DoS)  

Категории