CCSP CSI Exam Cram 2 (Exam Cram 642-541)

[A] [B] [C] [D] [E] [F] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

AAA

       enabling  

AAA (Authentication, Authorization, and Accounting)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

acceptable use (AU)

       security policies  

access

       routers

               securing   2nd   3rd   4th   5th   6th  

       software

               remote users  

       switches

               securing   2nd  

       unauthorized   2nd   3rd   4th   5th  

access control lists (ACLs)  

access- group command  

accounting

       configuring   2nd  

ACLs (access control lists)  

Adaptive Security Algorithm (ASA)  

addresses

       IP

               VPNs  

       IP:spoofing  

answers

       practice exam 2   2nd  

applications

       access

               remote users  

       as targets  

       PrepLogic Practice Exams, Preview Edition software   2nd  

               applying   2nd   3rd   4th  

               deleting  

               exam simulation   2nd  

               installing  

               interface  

               learning environment   2nd  

               quesiton quality  

               software requirements  

       software assets   2nd  

applying

       NTP   2nd  

       PrepLogic Practice Exams, Preview Edition   2nd   3rd   4th  

architecture

       SAFE   2nd   3rd  

               exam prep questions   2nd   3rd   4th   5th   6th   7th   8th   9th  

               information assets   2nd   3rd   4th   5th   6th   7th   8th  

               location assets   2nd   3rd   4th  

       VPns  

ASA (Adaptive Security Algorithm)  

assessment

       threats

               whitepapers.   [See also whitepapers]

assets

       classifying  

       medium networks  

               Campus module   2nd  

       remote users  

       security policies  

assets.   [See also information assets]

attacks

       DDoS  

       DoS  

       man-in-the-middle  

attacks.   [See also threats]

AU (acceptable use)

       security policies  

audits

       security policies   2nd  

authentication

       configuring   2nd   3rd  

       NTP   2nd  

       remote users   2nd  

Authentication, Authorization, and Accounting (AAA)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

authorities

       security policies   2nd  

authorization

       configuring   2nd  

availability

       high-availability (HA)  

       VPNs  

Категории