CCSP SECUR Exam Cram 2 (642-501)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

SA

       lifetimes  

saving

       CA configurations  

SCEP  

scores

       PrepLogic Practice Exams, Preview Edition  

security

       AAA.   [See also AAA]

       Easy VPN  

               adding XAUTH   2nd   3rd  

               applications   2nd   3rd  

               Cisco VPN software client 3.x   2nd   3rd   4th   5th   6th   7th  

                components  

               configuring   2nd   3rd   4th   5th   6th   7th   8th   9th  

               connecting   2nd  

               logs  

               Remote  

               Remote Phase 2   2nd   3rd   4th  

               servers   2nd   3rd   4th   5th   6th   7th   8th   9th  

               supported options   2nd  

               tunneling Remote Phase 2   2nd   3rd   4th  

               unsupported options   2nd  

       firewalls   2nd  

               analyzing traffic   2nd   3rd  

               deploying   2nd  

               Easy VPN  

               signature responses   2nd  

       IPSec   2nd   3rd  

               adding Layer 3 security information   2nd  

               AH   2nd  

                antireplay protection   2nd   3rd  

               asymmetric key algorithms   2nd   3rd   4th  

               authentication   2nd  

               CA support   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

               confidentiality  

               configuring   2nd   3rd   4th   5th   6th   7th   8th  

               connections  

               creating IKE policies   2nd   3rd   4th   5th   6th  

               crypto ACLs   2nd   3rd  

               crypto maps   2nd   3rd  

               data integrity   2nd  

               defining IKE Phase 1   2nd   3rd  

               defining IKE Phase 2   2nd  

               digital certificates   2nd   3rd   4th   5th  

               domains/hostnames   2nd   3rd   4th   5th   6th   7th   8th  

               enabling IKE  

               encryption  

               ESP  

               framework   2nd  

               hash algorithms   2nd   3rd  

               implementing IKE   2nd   3rd  

               ISAKMP   2nd  

               ISAKMP identities   2nd  

               origin authentication   2nd   3rd   4th  

               peers  

               planning IKE   2nd  

               policies  

               preshared keys   2nd  

               protocols   2nd  

               remote-acess VPNs  

               site-to-site VPNs  

               symmetric key algorithms   2nd   3rd   4th  

               symmetrical ACLs   2nd  

               testing  

               transform sets   2nd  

               troubleshooting   2nd  

               tunneling   2nd  

               VPNs   2nd  

       levels

               Syslog  

       networks

               classifying attacks   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

               implementing   2nd   3rd   4th   5th   6th  

       policies   2nd  

               exam questions  

       routers   2nd  

               assessing risk   2nd  

               configuring administrative access   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd  

               creating ACLs   2nd  

               disabling interfaces/services   2nd   3rd   4th   5th   6th  

               mitigating threats   2nd  

               PIX firewalls   2nd   3rd  

       SNMP   2nd  

self-assessment   2nd   3rd   4th   5th   6th   7th  

       answering questions   2nd  

       building confidence   2nd  

       exam layout and design   2nd   3rd  

       exam-readiness  

       testing center environment   2nd  

sending event notifications   2nd  

servers

       AAA

               connecting from   2nd  

       CSACS   2nd   3rd  

               appliance   2nd  

               configuring   2nd   3rd   4th   5th  

               services  

               troubleshooting   2nd   3rd  

               Windows NT/2000   2nd  

       disabling  

       Easy VPN   2nd   3rd   4th   5th  

               adding XAUTH   2nd   3rd  

               applications   2nd   3rd  

               Cisco VPN software client 3.x   2nd   3rd   4th   5th   6th   7th  

               configuring   2nd   3rd   4th   5th   6th   7th   8th   9th  

               connecting   2nd  

               customizing   2nd   3rd   4th  

               logs  

               Remote Phase 2   2nd   3rd   4th  

               supported options   2nd  

               tunneling Remote Phase 2   2nd   3rd   4th  

               unsupported options   2nd  

       external

               implementing AAA   2nd  

       HTTP

               enabling  

       Router MC   2nd  

               CiscoWorks 2000   2nd  

               configuring VPN   2nd   3rd   4th   5th   6th   7th   8th  

               devices   2nd   3rd  

       Syslog

               logging to  

service password-encryption command  

services

       AAA.   [See also AAA]

       CBAC   2nd  

               applying   2nd   3rd   4th   5th   6th   7th  

               audit trails   2nd  

               configuring Syslog   2nd  

               deleting  

               global parameters   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

               identifying traffic   2nd   3rd   4th   5th   6th   7th   8th  

               inspection  

               nonstandard application port implementation  

               PAM   2nd   3rd   4th  

               protocols   2nd  

               testing   2nd   3rd   4th  

       CSACS  

       routers

               disabling   2nd   3rd   4th   5th   6th  

sessions

       activity timeouts   2nd  

        half- open

               measuring   2nd   3rd   4th   5th   6th   7th  

       IPSec.   [See also IPSec]

SHA-1  

show commands

       authentication policy  

       CBAC   2nd  

       digital certificates   2nd  

       IDS

               testing  

       IKE  

       IPSec  

signatures

       default global configurations  

       digital

               IPSec  

       disabling/excluding   2nd   3rd  

       firewalls   2nd  

               deploying   2nd  

               responses   2nd  

               types of   2nd   3rd  

       RSA

               IPSec  

simulation, PrepLogic Practice Exams, Preview Edition  

site-to-site VPNs  

sizing

       MTUs  

sizing queues   2nd  

SMTP

       rules  

smurf attacks  

SneakerNet  

SNMP

       securing   2nd  

       vulnerabilities  

source routing

       IP

               disabling  

spam

       thresholds

               configuring  

spikes  

spokes

       Router MC  

spoofing   2nd  

       mitigating  

SSH

       vulnerabilities   2nd  

SSL

       vulnerabilities  

standard ACLs, creating.   [See also ACLs]

starting

       PrepLogic Practice Exams, Preview Edition   2nd  

status

       of activities  

statutory warnings

       configuring  

structured threats  

study habits

       preparing for exams   2nd   3rd  

support

       Router MC  

symmetric encryption  

symmetric key algorithms   2nd   3rd   4th  

symmetrical ACLs   2nd  

SYN-ACK packet

       CBAC global parameters   2nd   3rd  

Syslog

       components  

       configuring   2nd  

       security levels  

Syslog servers

       logging to  

Категории