Security+ Certification Exam Cram 2 (Exam Cram SYO-101)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

W3C Web site

       cryptographic resources  

       Security FAQ Pages  

WAP

       (Wireless Application Protocol)   2nd  

       current specifications   2nd  

       security vulnerabilities   2nd  

war driving

       wireless networks  

war-chalking

       wireless devices  

war-dialing attacks (modems)

       preventing   2nd  

war-driving

       wireless devices  

Warez (cracked commercial programs)

       unauthorized file sharing via FTP   2nd  

weak key encryption  

Web

       Domain 2.0 skill set (communication security)  

Web browsers

       cookies

               function of  

               privacy issues  

               session values   2nd  

web of trust CA model (Certificate Authorities)  

Web servers  

       connectivity protocols  

               HTTPS  

               SSL  

               TLS  

       services

               hardening measures  

Web sites

       CERT

               Incident Report Guidelines Page  

       CERT Coordination Center  

       CompTIA

               exam resources  

               exam training venues  

       Computer Forensics  

       cookies

               transmission of  

       Cram Session  

       ExamCram.com  

       FAQS.org  

       Honeynet.org  

       How Stuff Works  

       IEEE Standards Association  

       IETF  

       InformIT  

       Invir.com  

       Mail-Abuse.org  

       McAfee Security Antivirus  

       MeasureUp  

       Microsoft Kerberos  

       Microsoft Press  

       Microsoft TechNet  

       Microsoft Training and Certification  

       NIST   2nd  

       PrepLogic  

       RSA Security   2nd  

       SANS.org   2nd   3rd  

       Sophos Antivirus  

       Spam Primer  

       SSH.com  

       Symantec Antivirus  

       Transcender  

       UC Davis  

       Virus Bulletin  

       W3C  

               Security FAQ Pages  

Web vulnerabilities

       ActiveX controls  

       buffer overflows   2nd  

       CGI scripts (Common Gateway Interface)   2nd  

       cookies   2nd   3rd  

       Java   2nd  

       JavaScript   2nd  

       signed applets (Java)   2nd  

       SMTP Relay agents

               spam proliferation   2nd  

WEP

       (Wired Equivalent Privacy)  

Wi-Fi networks

       802.11x standards implementation   2nd  

               clear-text data transmission  

               man-in-the-middle attacks  

               radio traffic detection  

               session hijacking  

               war chalking  

               war driving  

       VPNs

               via L2TP   2nd   3rd   4th  

               via PPTP   2nd   3rd   4th  

Wired Equivalent Privacy (WEP)   2nd  

Wired Equivalent Privacy,   [See WEP]

wireless access points (WAPs)  

Wireless Application Protocol,   [See WAP]2nd   [See WAP]

wireless cell networks

       VoIP (Voice over IP) technology  

wireless devices  

       IEEE 802.11 standards  

       war-chalking  

       war-driving  

       Wired Equivalent Privacy (WEP)  

wireless network policies  

wireless networks

       Domain 2.0 skill set (communication security)  

       man-in-the-middle attacks  

       radio frequency (RF) interference   2nd  

       site surveys

               protection measures  

       vulnerabilities

               802.11x standard  

               Bluetooth standard  

               i-Mode standard   2nd  

               RC4 encryption  

               site survey planning   2nd  

               WAP (Wireless Application Protocol)   2nd  

               war driving  

               WTLS  

       WEP standard (Wired Equivalent Privacy)  

Wireless Transport Layer Security (WTLS)  

Wireless Transport Layer Security,   [See WTLS]

WLANs

       (wireless LANs)  

       attack vulnerabilities

               man-in-the-middle  

               session hijacking  

       IEEE 802.11 standards  

       monitoring tools

               Airopeek NX  

               Kismet  

               NetStumbler  

               Sniffer Wireless  

       war-chalking  

       war-driving  

       Wired Equivalent Privacuy (WEP)  

workstations

       vulnerabilities   2nd   3rd  

worms

       (malicious code)  

       Badtrans  

       Code Red  

       Linux Slapper  

       Morris  

       Nimda  

WTLS

       (Wireless Transport Layer Security)  

       security vulnerabilities  

Категории