Compare cert salaries and plan your next career move
epanidou wrote: what I remember: 1. disabling mail relaying Unix ("dot" in the end - read carefully notes on this excelent site) 2. reverse lookups as another protection in similar question 3. physical security bariers- camera, motion detector, guard (I chose guard although all of these pertain physical security) 4. key length in SSL (40, 12 5. intrusion detection-false positive 6. confidentiality, integrity, availability but in a tricky way 7. recognize which are asymmetric and symmetric algorithms 8. non-repudiation 9. allowing anonymous FTP and its repercusions (but from different than security side: more uploads and downloads?, changes in user profiles, directories) 10. CGI - buffer overflow 11. instant messengers - social enginering used there 12. few questions on attacks and how to distinguish them 13. routers and ingress filters 14. attacks on HASHED PASSWORDS!!! 15. attacks: footprinting and fingerprinting in 2 questions 16. people are the weakest link 17. biometrics most expensive 18. few questions on access control : separation od duties, need to know, security levels and labels 19. examples of smart cards, what is not 20. malicious code, virus, logic bomb, warm - differences, distinguish them 21. WTLS - model, elements, privacy, integrity, war driving 22.ISAKMP - it does not establish session keys 23. PLEASE READ CAREFULLY NOTES ON THIS WEBSITE.... JOHAN DID AN EXCELLENT JOB!!!!! - a huge THANK YOU!!!
Compare salaries for top cybersecurity certifications. Free download for TechExams community.