CCSP SECUR Exam Cram 2 (642-501)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

RADIUS

       AAA   2nd   3rd  

               configuring   2nd  

       CSACS   2nd  

reconnaissance attacks  

       mitigating  

recovery

       passwords   2nd   3rd  

redirection

       ports

               mitigating  

Remote Easy VPN  

Remote Phase 2 (Easy VPN)   2nd   3rd   4th  

       tunneling   2nd   3rd   4th  

remote-access

       VPNs  

reports

       deployment

               Router MC  

requests

       identity certificates  

requirements

       Router MC   2nd  

resources   2nd  

       certificaton   2nd  

responses

       signatures   2nd  

reviewing

       PrepLogic Practice Exams, Preview Edition  

risk

       routers

               assessing   2nd  

root certificates.   [See also digital certifcates]

Router Management Center (MC)   2nd  

       CiscoWorks 2000   2nd  

       configuring VPN   2nd   3rd   4th   5th   6th   7th   8th  

       devices   2nd   3rd  

       requirements   2nd  

       tunneling  

Router MC

       exam prep questions   2nd   3rd  

routers

       authentication proxy

               AAA   2nd  

               configuring   2nd   3rd  

               connecting from AAA   2nd  

               creating profiles   2nd   3rd  

               defining   2nd   3rd  

               enabling  

               HTTP  

               idle timeout values   2nd  

               rules   2nd   3rd  

               testing   2nd   3rd  

       CA  

        clients

               Easy VPN  

       edge

               configuring AAA   2nd   3rd   4th   5th   6th   7th   8th   9th  

       firewalls   2nd  

               analyzing traffic   2nd   3rd  

               deploying   2nd  

               signature responses   2nd  

       hostnames

               configuring  

       IPSec

               configuring  

               creating IKE policies   2nd   3rd   4th   5th   6th  

               crypto ACLs   2nd   3rd  

               crypto maps   2nd   3rd  

               digital certificates   2nd   3rd   4th   5th  

               domains/hostnames   2nd   3rd   4th   5th   6th   7th   8th  

               enabling IKE  

               implementing IKE   2nd   3rd  

               ISAKMP identities   2nd  

               preshared keys   2nd  

               symmetrical ACLs   2nd  

               testing  

               transform sets   2nd  

       security   2nd  

               assessing risk   2nd  

               configuring administrative access   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd  

               creating ACLs   2nd  

               disabling interfaces/services   2nd   3rd   4th   5th   6th  

               exam prep questions   2nd   3rd   4th  

               mitigating threats   2nd  

               PIX firewalls   2nd   3rd  

       threats

               mitigating   2nd  

routing

       IP source routing

               disabling  

RPC rules  

RSA  

       encrypted nonces  

       key pairs

               generating  

       signatures

               IPSec  

RSA key pairs, generating   2nd  

rules

       authentication proxy   2nd   3rd  

       CBAC

               applying ACLs   2nd   3rd   4th   5th   6th   7th  

       generic application protocol  

       inspection

               identifying traffic   2nd   3rd   4th   5th   6th   7th   8th  

       IP packet fragmentation   2nd   3rd   4th  

       Java  

       RPC  

       SMTP  

       translation

               Router mC  

       unique application protocol   2nd  

Категории