CCSP CSI Exam Cram 2 (Exam Cram 642-541)

[A] [B] [C] [D] [E] [F] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

CA (Certificate Authority)  

campus modules   2nd  

       Management module   2nd  

       Server module   2nd  

campus networks

       CS ACS   2nd   3rd  

       exam prep questions   2nd   3rd   4th   5th   6th   7th   8th   9th  

       IDS   2nd  

               conifguring HIDS   2nd  

               conifguring NIDS   2nd  

Campus networks

       medium networks  

               assets   2nd  

               design   2nd  

               implementing   2nd  

               mitigatng threats   2nd  

               threats   2nd  

campus networks

       routers  

               securing access   2nd   3rd   4th   5th   6th  

               securing management/services   2nd   3rd   4th  

       small networks   2nd   3rd   4th   5th   6th   7th   8th  

       switches  

               securing access   2nd  

               securing management/services  

               securing ports  

CDP (Cisco Discovery Protocol)   2nd   3rd  

       configuring   2nd  

       versions  

CEF (Cisco Express Forwarding)  

centralized management

       remote users   2nd  

certification

       exams

               content   2nd  

               preparing for  

               results   2nd  

               taking   2nd   3rd  

               techniques   2nd   3rd  

               topics   2nd   3rd   4th   5th  

Cisco Discovery Protocol (CDP)   2nd   3rd  

       configuring   2nd  

       versions  

Cisco Express Forwarding (CEF)  

Cisco Security Agent (CSA)  

CiscoSecure Access Control Server (CS ACS)   2nd   3rd  

classifying assets  

clients

       VPN  

               3002 VPN Hardware Client   2nd  

               3002 VPN Software Client   2nd  

               remote users  

commands

       access- group  

        exec -timeout  

       network   2nd  

       service password-encryption  

       transport  

communications

       OSI model

               modular approach of   2nd  

compression

       VPNs  

configuration

       accounting   2nd  

       authentication   2nd   3rd  

       authorizaton   2nd  

       CDP   2nd  

       Corporate Internet module  

       E-Commmerce module  

       Enterprise SAFE model   2nd  

               axioms   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

       HIDS   2nd  

       medium networks   2nd  

               branch/headend   2nd  

               Campus   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

               WAN  

       NIDS   2nd  

       NTP   2nd   3rd  

       PIX firewalls  

               IPSec   2nd   3rd  

               NAT   2nd  

               traffic segregation   2nd  

       remote users   2nd  

               accessing software  

               assets  

               authentication   2nd  

               centralized management   2nd  

               customizing  

               hardware VPN clients  

               implementing   2nd  

               implementing firewalls   2nd   3rd  

               remote site broadband routers   2nd  

               threats   2nd   3rd   4th  

       routers   2nd   3rd   4th   5th   6th   7th   8th   9th  

               nonperimeter   2nd   3rd   4th   5th   6th   7th   8th  

               RFC 2827 filtering   2nd  

               Unicast RPF   2nd  

       Server module   2nd  

       small networks   2nd  

               Campus module   2nd  

       SMR   2nd   3rd   4th   5th  

       SNMP   2nd  

       switches  

               securing access   2nd  

               securing management/services  

               securing ports  

       VPN   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

               3002 VPN Hardware Client   2nd  

               3002 VPN Software Client   2nd  

               clients  

       VPN Concentrator 3000 series   2nd   3rd  

       VPN/Remote Access module  

       WAN module  

connections

       small networks  

               assets   2nd  

               branches/standalone organizations  

               Campus module   2nd   3rd   4th   5th   6th   7th   8th  

               design   2nd  

               devices   2nd   3rd   4th  

               mitigating threats   2nd  

               threats   2nd   3rd   4th  

       VPN Concentrator 3000 series   2nd   3rd  

       wireless

               design   2nd  

content

       exams   2nd  

contractors, sources of internal threats  

Corporate Internet module   2nd  

       SMR  

costs

       security   2nd  

cron jobs  

CS ACS (CiscoSecure Access Control Server)   2nd   3rd  

CSA (Cisco Security Agent)  

customization

       exams   2nd  

       remote users  

               accessing software  

               authentication   2nd  

               centralized management   2nd  

               hardware VPN clients  

               implementing firewalls   2nd   3rd  

               remote site broadband routers   2nd  

Категории