Hot Tips for Security+ SY0- 101 Exam - GetCertify4Less.com
Hot Tips for Security+ SY0- 101 Exam - GetCertify4Less.com
Hot Tips for Security+ SY0- 101 Exam - GetCertify4Less.com
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Token<br />
A device that creates changing ID codes on a network. Similar to a Smart Card. Refer to<br />
Smart Card<br />
http://searchsecurity.techtarget.<strong>com</strong>/sDefinition/0,,sid14_gci795971,00.html<br />
http://www.webopedia.<strong>com</strong>/TERM/t/token.html<br />
Tower of Hanoi<br />
A tape backup rotation method that uses each tape a different number of times<br />
http://www.govst.edu/users/gintern/group4/tape.html<br />
Trojan Horse<br />
Malicious code pretending to be something benign<br />
http://searchsecurity.techtarget.<strong>com</strong>/sDefinition/0,,sid14_gci213221,00.html<br />
Refer to CTL<br />
Trust List<br />
Tunneling<br />
Creating a private encrypted <strong>com</strong>munication channel through a public network such as the<br />
Internet<br />
http://searchsecurity.techtarget.<strong>com</strong>/sDefinition/0,,sid14_gci213230,00.html<br />
Virus<br />
Software code ranging from annoying to destructive and self-replicating. May be a macro virus,<br />
a virus that destroys the in<strong>for</strong>mation in the boot sector of a drive or other <strong>for</strong>m<br />
http://searchsecurity.techtarget.<strong>com</strong>/sDefinition/0,,sid14_gci213306,00.html