20.06.2013 Views

Hot Tips for Security+ SY0- 101 Exam - GetCertify4Less.com

Hot Tips for Security+ SY0- 101 Exam - GetCertify4Less.com

Hot Tips for Security+ SY0- 101 Exam - GetCertify4Less.com

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Token<br />

A device that creates changing ID codes on a network. Similar to a Smart Card. Refer to<br />

Smart Card<br />

http://searchsecurity.techtarget.<strong>com</strong>/sDefinition/0,,sid14_gci795971,00.html<br />

http://www.webopedia.<strong>com</strong>/TERM/t/token.html<br />

Tower of Hanoi<br />

A tape backup rotation method that uses each tape a different number of times<br />

http://www.govst.edu/users/gintern/group4/tape.html<br />

Trojan Horse<br />

Malicious code pretending to be something benign<br />

http://searchsecurity.techtarget.<strong>com</strong>/sDefinition/0,,sid14_gci213221,00.html<br />

Refer to CTL<br />

Trust List<br />

Tunneling<br />

Creating a private encrypted <strong>com</strong>munication channel through a public network such as the<br />

Internet<br />

http://searchsecurity.techtarget.<strong>com</strong>/sDefinition/0,,sid14_gci213230,00.html<br />

Virus<br />

Software code ranging from annoying to destructive and self-replicating. May be a macro virus,<br />

a virus that destroys the in<strong>for</strong>mation in the boot sector of a drive or other <strong>for</strong>m<br />

http://searchsecurity.techtarget.<strong>com</strong>/sDefinition/0,,sid14_gci213306,00.html

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!