Cisa Exam Cram 2

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

natural disasters. [See DRPs (disaster recovery plans)]

Nessus vulnerability reports 2nd network databases Network File System (NFS)

Network layer (OSI) 2nd

network management network managers network policies

network-recovery teams networks 2nd 3rd 4th

     bridges 2nd     bus topology     callback systems

     collisions 2nd

     data encapsulation 2nd

     denial-of-service attacks (DoS) 2nd

     digital signatures 2nd 3rd     distributed denial-of-service attacks (DDoS)

     encryption

         AES (Advanced Encryption Standard)         algorithms

         asymmetric encryption 2nd 3rd

         Certificate Authorities (CAs) 2nd

         cryptography         DES (Data Encryption Standard)         digital certificates 2nd

         nonrepudiation

         private keys

         public key infrastructure (PKI) 2nd 3rd

         public keys 2nd 3rd

         symmetric encryption 2nd

         symmetric keys 2nd

     Ethernet 2nd

     extranets 2nd

     firewalls 2nd 3rd 4th 5th 6th 7th 8th 9th

         packet-filtering firewalls 2nd

         proxy firewalls 2nd 3rd 4th 5th

         stateful packet-inspection firewalls 2nd

     hubs/switches 2nd     Internet     intranets

     intrusion-detection systems (IDS) 2nd

     LANs (Local Area Networks) 2nd 3rd 4th 5th     MANs (Metropolitan Area Networks) 2nd 3rd     modems 2nd

     OSI (Open Systems Interconnect) model         Layer 1 (Physical) 2nd

         Layer 2 (Data Link) 2nd 3rd

         Layer 3 (Network) 2nd

         Layer 4 (Transport) 2nd 3rd         Layer 5 (Session) 2nd 3rd         Layer 6 (Presentation) 2nd 3rd

         Layer 7 (Application) 2nd 3rd

         table of 2nd     policies     ring topology 2nd

     risks and controls 2nd 3rd     routers 2nd

    security         encryption 2nd 3rd 4th 5th 6th 7th     security controls 2nd

     single sign-on (SSO) systems

     star topology 2nd

     TCP/IP (Transmission Control Protocol/Internet Protocol) 2nd 3rd

     voice communications security 2nd     VPN (virtual private networking)

     WANs (Wide Area Networks) 2nd

networks. 2nd [See also protocols] NFS (Network File System)

noncompete agreements

noncritical functions

nondiscretionary access 2nd nonrepudiation normalization

notebooks

Категории