Glossary

This glossary contains the key terms from the book. All the terms from each chapter’s “Define Key Terms” tasks are defined here.

3-leg perimeter A type of DMZ where a firewall has three legs that connect to the LAN, the Internet, and the DMZ.

10 tape rotation A backup rotation scheme in which ten backup tapes are used over the course of two weeks.

802.1X An authentication technology used to connect devices to a LAN or WLAN. It is an example of port-based network access control (NAC).

acceptable use Often defined as a policy, acceptable use defines the rules that restrict how a computer, network, or other system may be used.

access control list (ACL) A list of permissions attached to an object. ACLs specify what level of access a user, ...

Get CompTIA® Security+ SY0-401 Cert Guide, Deluxe Edition, Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.