CCSP SECUR Exam Cram 2 (642-501)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

packet mode (AAA)  

packet sniffers  

packets

       AAA  

       firewalls   2nd  

               analyzing traffic   2nd   3rd  

               deploying   2nd  

               signature responses   2nd  

       IP

               fragmentation rules   2nd   3rd   4th  

       SYN-ACK

               CBAC global parameters   2nd   3rd  

       unassembled  

PAM

       CBAC   2nd   3rd   4th  

parameters

       CBAC   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

passwords

       attacks

               mitigating  

       enable secret command  

       encrypting   2nd  

       policies

               configuring   2nd  

       recovering   2nd   3rd  

       Telnet   2nd   3rd   4th   5th  

peer policies

       IPSec   2nd  

peers

       IPSec  

       ISAKMP

               associating   2nd  

perimeter routers

       PIX firewalls   2nd  

physical threats

       routers   2nd  

PIX Firewall

       Easy VPN  

PIX firewalls  

       perimeter routers   2nd  

PKS #10  

PKS #7  

planning

       IDS

               analyzing traffic   2nd   3rd  

               deploying   2nd  

               signature responses   2nd  

       IKE   2nd  

policies

       IDS

               creating   2nd  

       IKE

               creating   2nd   3rd   4th   5th   6th  

               defining Phase 1   2nd   3rd  

               defining Phase 2   2nd  

               Router MC  

       IPSec  

       passwords

               configuring   2nd  

               encrypting   2nd  

               recovering   2nd   3rd  

       peer

               IPSec   2nd  

       security   2nd  

               exam questions  

       tunneling

               Router MV  

ports

       CBAC

               nonstandard implementation  

       console

                exec timeout values   2nd  

       consoles

               configuring password policies   2nd  

               encrypting password policies   2nd  

               recovering password policies   2nd   3rd  

       mapping

               configuring   2nd  

               verifying   2nd  

       redirection

               mitigating  

power loss  

practice tests   2nd  

       answer keys  

prep questions

       attacks   2nd   3rd   4th   5th  

       authentication proxy   2nd   3rd   4th   5th  

       CBAC   2nd   3rd   4th   5th  

       Easy VPN   2nd   3rd  

       IDS   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       IPSec   2nd   3rd   4th   5th   6th   7th  

       Router MC   2nd   3rd  

       routers   2nd   3rd   4th  

preparing for exams   2nd   3rd  

PrepLogic Practice Exams, Preview Edition   2nd   3rd  

       customizing   2nd  

       deleting   2nd  

       exam simulation  

       installing  

       interfaces  

       navigating  

       questions  

       reviewing  

       scoring  

       starting   2nd  

       timing  

preshared keys

       configuring   2nd  

       IPSec  

Privilege EXEC mode

       securing   2nd   3rd   4th  

profiles

       authentication proxy

               creating   2nd   3rd  

protected networks

       defining  

protection

        antireplay  

               IPSec   2nd  

protocols

       CBAC   2nd  

       CDP

               disabling  

       generic application rules  

       HTTP

               disabling   2nd  

       IPSec   2nd   3rd  

               adding Layer 3 security information   2nd  

               AH   2nd  

               antireplay protection   2nd   3rd  

               asymmetric key algorithms   2nd   3rd   4th  

               authentication   2nd  

               CA support   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

               confidentiality  

               configuring   2nd   3rd   4th   5th   6th   7th   8th  

               connections  

               creating IKE policies   2nd   3rd   4th   5th   6th  

               crypto ACLs   2nd   3rd  

               crypto maps   2nd   3rd  

               data integrity   2nd  

               defining IKE Phase 1   2nd   3rd  

               defining IKE Phase 2   2nd  

               digital certificates   2nd   3rd   4th   5th  

               domains/hostnames   2nd   3rd   4th   5th   6th   7th   8th  

               enabling IKE  

               encryption  

               ESP  

               framework   2nd  

               hash algorithms   2nd   3rd  

               implementing IKE   2nd   3rd  

               ISAKMP   2nd  

               ISAKMP identities   2nd  

               origin authentication   2nd   3rd   4th  

               peers  

               planning IKE   2nd  

               policies  

               preshared keys   2nd  

               protocols   2nd  

               remote-access VPNs  

               site-to-site VPNs  

               symmetric key algorithms   2nd   3rd   4th  

               symmetrical ACLs   2nd  

               testing  

               transform sets   2nd  

               troubleshooting   2nd  

               tunneling   2nd  

               VPNs   2nd  

       SNMP

               securing   2nd  

       unique application rules   2nd  

       vulnerabilities  

               logging  

               NTP  

               SNMP  

               SSH   2nd  

               SSL  

               Telnet  

               TFTP   2nd  

public-key algorithms   2nd   3rd   4th  

Категории