CCSP SECUR Exam Cram 2 (642-501)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

identities

       certificates

               obtaining  

identity certificates

       requesting  

IDF (intermediate distribution facility)  

idle timeout values   2nd  

idle times

       CBAC global parameters   2nd  

idnetities

       ISAKMP

               configuring   2nd  

IDS

       configuring  

               default global configurations  

               defining protected networks  

               sending event notifications   2nd  

               sizing queues   2nd  

       deploying   2nd  

               analyzing traffic   2nd   3rd  

               siganture responses   2nd  

       exam prep questions   2nd   3rd   4th   5th  

       inspection rules

               creating   2nd  

       signatures

               excluding  

       testing  

               clear commands  

               debug commands   2nd  

               show commands  

IDS (intrusion detection system)  

IKE

       CA  

       digital certificates  

       Easy VPN Server  

       enabling  

       implementing   2nd   3rd  

       Phase 1

               defining   2nd   3rd  

               IPSec   2nd  

       Phase 2

               defining   2nd  

               IPSec   2nd  

       planning   2nd  

       policies

               creating   2nd   3rd   4th   5th   6th  

       Router MC

               configuring  

       show commands  

implementation

       external server authentication   2nd  

       IPSec  

               configuring IKE   2nd   3rd  

               creating IKE policies   2nd   3rd   4th   5th   6th  

               crypto ACLs   2nd   3rd  

               crypto maps   2nd   3rd  

               digital certificates   2nd   3rd   4th   5th  

               domains/hostnames   2nd   3rd   4th   5th   6th   7th   8th  

               enabling IKE  

               ISAKMP identities   2nd  

               preshared keys   2nd  

               symmetrical ACLs   2nd  

               testing  

               transform sets   2nd  

       local authentication  

       nonstandard application port (CBAC)  

       security

               classifying attacks   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

               networks   2nd   3rd   4th   5th   6th  

importing

       devices  

inadequate power supply  

inbound traffic

       CBAC   2nd   3rd  

       crypto ACLs  

informaton signatures  

inspection

       CBAC  

               identifying   2nd   3rd   4th   5th   6th   7th   8th  

inspection rules

       IDS   2nd  

               excluding signatures  

installing

       PrepLogic Practice Exams, Preview Edition  

integrity  

       IPSec  

interesting traffic

       IPSec  

interfaces

       authentication proxy   2nd  

               AAA   2nd  

               configuring   2nd   3rd  

               connecting from AAA   2nd  

               creating profiles   2nd   3rd  

               enabling  

               HTTP  

               idle timeout values   2nd  

               rules   2nd   3rd  

               testing   2nd   3rd  

       cypto maps.   [See also crypto maps]

       PropLogic Practice Exams, Preview Edition  

       Router MC   2nd  

               CisocWorks 2000   2nd  

               configuring VPN   2nd   3rd   4th   5th   6th   7th   8th  

               devices   2nd   3rd  

               requirements   2nd  

               tunneling  

       routers

               disabling   2nd   3rd   4th   5th   6th  

intermediate distribution facility(IDF)  

internal routers

       PIX firewalls  

internal threats  

Internet Protocol Security.   [See IPSec]

interoperability

       CA  

intrusion detection system (IDS)  

IOS Firewall   2nd  

       authentication proxy

               AAA   2nd  

               configuring   2nd   3rd  

               connecting from AAA   2nd  

               creating profiles   2nd   3rd  

               defining   2nd   3rd  

               enabling  

               HTTP  

               idle timeout values   2nd  

               rules   2nd   3rd  

               testing   2nd   3rd  

       deploying   2nd  

               analyzing traffic   2nd   3rd  

               signature responses   2nd  

IOS IDS

       configuring  

               default global configurations  

               defining protected networks  

               sending event notifications   2nd  

               sizing queues   2nd  

       inspection rules   2nd  

       IOS Firewall.   [See also firewalls, IOS Firewall]

       testing  

               clear commands  

               debug commands   2nd  

               show commands  

IP

       addresses

               hostname-to mapping  

       directed broadcast

               disabling  

       packets

               fragmentation rules   2nd   3rd   4th  

       source routing

               disabling  

       spoofing   2nd  

               mitigating  

       unreachable messages

               disabling   2nd  

ip classless command  

ip mask-reply command  

IPSec

       authentication   2nd  

       configuring  

               creating IKE policies   2nd   3rd   4th   5th   6th  

               enabling IKE  

               implementing IKE   2nd   3rd  

       crypto ACLs   2nd   3rd  

       crypto maps   2nd   3rd  

       debug commands   2nd  

       digital certificates   2nd   3rd   4th   5th  

       Easy VPN Server   2nd  

       exam prep questions   2nd   3rd   4th   5th   6th   7th  

       ISAKMP identities   2nd  

        names

               domains/hostnames   2nd   3rd   4th   5th   6th   7th   8th  

       preshared keys   2nd  

       show commands  

       symmetrical ACLs   2nd  

       testing  

       transform sets   2nd  

IPSec (Internet Protocol Security)   2nd   3rd  

       AH   2nd  

        antireplay protection   2nd   3rd  

       asymmetric key algorithms   2nd   3rd   4th  

       authentication   2nd  

       CA support   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       confidentiality  

       configuring   2nd   3rd   4th   5th   6th   7th  

       connections  

       data integrity   2nd  

       encryption  

       ESP  

       framework   2nd  

       hash algorithms   2nd   3rd  

       IKE

               defining Phase 1   2nd   3rd  

               defining Phase 2   2nd  

               planning   2nd  

       ISAKMP   2nd  

       origin authentication   2nd   3rd   4th  

       packets

               adding Layer 3 security information   2nd  

       peers  

       policies  

       protocols   2nd  

       remote-access VPNs  

       site-to-site VPNs  

       symmetric key algorithms   2nd   3rd   4th  

       troubleshooting   2nd  

       tunneling   2nd  

       VPNs   2nd  

ISAKMP

       identities

               configuring   2nd  

       IPSec   2nd  

       peers

               associating   2nd  

Категории