Security+ Certification Exam Cram 2 (Exam Cram SYO-101)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

T-Sight tool

       man-in-the-middle attacks  

TACACS

       (Terminal Access Controller Access Control System)   2nd  

       remote access dial-up authentication issues  

TACACS+

       remote dial-up authentication issues   2nd  

tagging (VLANs)   2nd  

tape  

       AIT (Advanced Intelligent Tape)  

        backups

               frequency of  

       copy backups  

       DAT (Digital Audio Tape)  

       differential backups  

       DLT (Digital Linear Tape)  

       full backups  

       incremental backups  

       QIC (Quarter Inch Cartridge)  

       rotation methods  

       storage requirements

               evaluating   2nd  

       Super DLT (Digital Linear Tape)  

       Travan  

TCP port 80  

TCP/IP hijacking attacks  

TCP/IP Illustrated  

Teardrop attack (DoS)  

telecom systems (telephones)

       attack prevention   2nd  

Telnet

       man-in-the-middle attacks  

Telnet protocol

       SSH protocol alternative  

Telnet utility

       diagnostic functions  

TEMPEST (Transient Electromagnetic Pulse Emanation Standard)

       electronic eavesdropping protection  

Terminal Access Controller Access Control System,   [See TACACS]2nd   [See TACACS]

Terminal Services

       as tool in back door attacks  

threats

       common/non essential services

               identifying  

       common/nonessential services

               identifying   2nd   3rd   4th   5th   6th   7th   8th  

       risk identification

               assessing   2nd  

tiger teams

       vulnerability testing  

Tiger Tools TigerSuite scanner  

TLS

       protocol vulnerabilities   2nd  

       successor to SSL  

token-based authentication  

tokens

       authentication solutions  

top secret data

       handling   2nd  

topologies (security)  

        bastion -host firewall  

       screened host gateways   2nd  

       screened subnet gateways   2nd  

Tower of Hanoi

       tape rotation  

traceroute utility

       diagnostic functions  

tracert utility

       diagnostic functions  

Transcender Web site

       exam practice resources  

Transport Layer Security (TLS)  

Transport Layer Security,   [See TSL]

Travan tape  

Triple Data Encryption Standard (3DES)

       symmetric key algorithm  

Trojan horses

       (malicious code)  

       Acid Rain  

       Simpsons  

       Trojan.W32.Nuker  

Trojan.W32.Nuker (Trojan horse)  

trust models

       Certificate Authorities (CAs)   2nd   3rd  

               bridge CA  

               cross-certification CA  

               hierarchical CA  

               root CA  

               web of trust CA  

Trusted Computer System Evaluation Criteria (TCSEC)

       access control methods  

TSL

       (Transport Layer Security)  

       encryption levels  

       operational layers

               TLS Handshake Protocol  

               TLS Record Protocol  

tunneling

       FAQS.org Web site  

       Layer 2 Tunneling Protocol  

       PPTP  

tunneling (VPNs)

       security configuration  

tutorials

       exam practice sections  

twisted-pair cable

       STP  

       UTP  

Категории