O'Reilly logo

CompTIA® Security+ SY0-501 Cert Guide by David L. Prowse

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Glossary

This glossary contains the key terms from the book. All the terms from each chapter’s “Define Key Terms” tasks are defined here.

3-leg perimeter   A type of DMZ where a firewall has three legs that connect to the LAN, the Internet, and the DMZ.

10 tape rotation   A backup rotation scheme in which ten backup tapes are used over the course of two weeks.

802.1X   An authentication technology used to connect devices to a LAN or WLAN. It is an example of port-based network access control (NAC).

acceptable use policy (AUP)   Policy that defines the rules that restrict how a computer, network, or other system may be used.

access control list (ACL)   A list of permissions attached to an object specifying what level of access a user, users, or ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required