Read this whole guide offline with no ads, for a low price!
Click Here!
Use coupon code "certiguide" to save 20%!
(Expires 2004/12/31)

Need more practice? 300 additional Security+ questions!
Get It Here!

Custom Search







Table Of Contents  CertiGuide to Security+

Previous Topic/Section
1.10  Success Answers
Previous Page
Pages in Current Topic/Section
1
Next Page
Getting Ready for Chapter 2 - Questions
Next Topic/Section

Chapter 2:  Communication Security (Domain 2.0; 20%)

"The essence of knowledge is, having it, to apply it; not having it, to confess your ignorance."
– Confucius

 

Chapter Objectives

The objective of this chapter is to provide the reader with an understanding of:

Domain 2.0: Communication Security - 20%

2.1 Recognize and understand the administration of the following types of remote access technologies:

  • 802.1x; VPN (Virtual Private Network)

  • RADIUS (Remote Authentication Dial-In User Service)

  • TACACS (Terminal Access Controller Access Control System)

  • L2TP / PPTP (Layer Two Tunneling Protocol / Point to Point Tunneling Protocol)

  • SSH (Secure Shell); IPSEC (Internet Protocol Security); Vulnerabilities

2.2 Recognize and understand the administration of these email security concepts:

    • S/MIME (Secure Multipurpose Internet Mail Extensions)

    • PGP (Pretty Good Privacy) like technologies

    • Vulnerabilities; SPAM; Hoaxes

2.3 Recognize and understand the administration of these Internet security concepts:

    • SSL / TLS (Secure Sockets Layer / Transport Layer Security)

    • HTTP/S (Hypertext Transfer Protocol / HTTP over Secure Sockets Layer)

    • Instant Messaging (Vulnerabilities; Packet Sniffing; Privacy)

    • Vulnerabilities (Java Script; ActiveX; Buffer Overflows; Cookies; Signed Applets; CGI; SMTP Relay)

2.4 Recognize and understand the administration of these directory security concepts:

    • SSL / TLS; LDAP (Lightweight Directory Access Protocol)

2.5 Recognize and understand the administration of the following file transfer protocols and concepts:

    • S/FTP (File Transfer Protocol); Blind FTP (File Transfer Protocol) / Anonymous

    • File Sharing; Vulnerabilities (Packet Sniffing; 8.3 Naming Conventions)

2.6 Recognize and understand the administration of these wireless technologies and concepts:

    • WTLS (Wireless Transport Layer Security)

    • 802.11 and 802.11x; WEP / WAP; Vulnerabilities; Site Surveys

Quick navigation to subsections and regular topics in this section



Previous Topic/Section
1.10  Success Answers
Previous Page
Pages in Current Topic/Section
1
Next Page
Getting Ready for Chapter 2 - Questions
Next Topic/Section

If you find CertiGuide.com useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Security+ from StudyExam4Less.com. (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $



Home - Table Of Contents - Contact Us

CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004

Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.