CCSP CSI Exam Cram 2 (Exam Cram 642-541)

[A] [B] [C] [D] [E] [F] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

SA (Security Association)  

SA (security association)  

SAFE architecture   2nd   3rd  

       exam prep questions   2nd   3rd   4th   5th   6th   7th   8th   9th  

       information assets   2nd   3rd   4th   5th   6th   7th   8th  

       location assets   2nd   3rd   4th  

SAFE Blueprint  

       Enterprise model   2nd  

               axioms   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

               design   2nd  

       exam prep questions   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       modular approach   2nd   3rd   4th   5th  

               campus modules   2nd   3rd   4th   5th  

               edge modules   2nd   3rd   4th   5th   6th   7th   8th   9th  

       philosophy of  

       SMR  

               design   2nd   3rd   4th   5th  

       VPN   2nd  

               design   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

       wireless  

               design   2nd  

scans

       ports   2nd  

scores, exams  

script kiddies  

Secure Shell protocol (SSH)  

Secure stage (security wheel)   2nd  

security

       cost/protection tradeoffs   2nd  

       NTP   2nd  

       PIX firewalls  

               IPSec   2nd   3rd  

               NAT   2nd  

               traffic segregation   2nd  

       policies   2nd  

               acceptable use  

               assets  

                audits   2nd  

               authorities   2nd  

               Enterprise SAFE model  

               Enterprise SAFE model.   [See also Enterprise SAFE model]

               exam prep questions   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

               example of   2nd   3rd   4th   5th   6th   7th  

               icident response  

               Improve stage (security wheel)  

               Monitor stage (security wheel)   2nd  

               revisions  

               risks   2nd  

               Secure stage (security wheel)   2nd  

               security wheel   2nd  

               technologies  

               Test stage (security wheel)  

               threats  

       routers

               campus networks   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

       SAFE architecture   2nd   3rd  

               exam prep questions   2nd   3rd   4th   5th   6th   7th   8th   9th  

               information assets   2nd   3rd   4th   5th   6th   7th   8th  

               location assets   2nd   3rd   4th  

       small networks

               assets   2nd  

               design   2nd  

               devices   2nd   3rd   4th  

               mitigating threats   2nd  

               threats   2nd   3rd   4th  

       SMR  

               design   2nd   3rd   4th   5th  

       switches  

               securing access   2nd  

               securing management/services  

               securing ports  

       threats  

               exam prep questions   2nd   3rd   4th   5th   6th   7th   8th  

               external   2nd   3rd  

               internal   2nd   3rd   4th  

               mitigating.   [See also whitepapers]

               reconnaissance   2nd   3rd   4th   5th   6th   7th   8th  

               types of  

               unauthorized access   2nd   3rd   4th   5th  

       VPN   2nd  

               design   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

       wireless  

               design   2nd  

Security Association (SA)  

security association (SA)  

segregation

       traffic   2nd  

Server module   2nd  

servers

       AAA  

       CS ACS   2nd   3rd  

       small networks  

               assets   2nd  

               branches/standalone organizations  

               Campus module   2nd   3rd   4th   5th   6th   7th   8th  

               design   2nd  

               devices   2nd   3rd   4th  

               mitigating threats   2nd  

               threats   2nd   3rd   4th  

service password-encryption command  

services

       routers

               securing   2nd   3rd   4th  

serviecs

       switches

               securing  

session replay  

sessions

       Flash Review mode

               starting  

       Practice Exam mode

               starting   2nd  

       TFTP   2nd  

Simple Network Management Protocol (SNMP)   2nd   3rd  

       configuring   2nd  

       versions  

single-purpose devices, VPNs  

small networks  

       assets   2nd  

       branches/standalone organizations  

       Campous module   2nd   3rd   4th   5th   6th   7th   8th  

       design   2nd  

       devices   2nd   3rd   4th  

       exam prep questions   2nd   3rd   4th   5th   6th   7th   8th   9th  

       mitigating threats   2nd  

       threats   2nd   3rd   4th  

SMR

       exam prep questions   2nd   3rd   4th   5th  

SMR (small, midsize, and remote user networks)

       SAFE Blueprint   2nd  

               design   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

SMR Blueprint

       remote user options  

               accessing software  

               hardware VPN clients  

               implementing firewalls   2nd   3rd  

               remote site broadband routers   2nd  

sniffers

       packets   2nd   3rd  

SNMP (Simple Network Management Protocol)  

SNMP (Simple Network Mangement Protocol)   2nd  

       configuring   2nd  

       versions  

social engineering  

software

       3002 VPN Software Client   2nd  

       access

               remote users  

       assets   2nd  

       PrepLogic Practice Exams, Preview Edition   2nd  

               applying   2nd   3rd   4th  

               deleting  

               exam simulation   2nd  

               installing  

               interface  

               learning environment   2nd  

               question quality  

               software requirements  

spies  

split tunneling   2nd  

       exam prep questions   2nd  

spoofing IP addresses  

SSH (Secure Shell protocol)  

standalone organizations

       small networks  

starting

       Flash Review mode  

       Practice Exam mode   2nd  

stratum  

sweeps

       ping   2nd  

switches

       as targets   2nd   3rd   4th  

       campus networks  

               securing access   2nd  

               securing management/services  

               securing ports  

       NTP

               configuring   2nd  

       SNMP  

Категории