Glossary
This glossary contains the key terms from the book. All the terms from each chapter’s “Define Key Terms” tasks are defined here.
10 tape rotation
A backup rotation scheme in which 10 backup tapes are used over the course of 2 weeks.
802.1X
An authentication technology used to connect devices to a LAN or WLAN. It is an example of port-based NAC.
acceptable use
Acceptable usage policies define the rules that restrict how a computer, network, or other system may be used.
access control list (ACL)
A list of permissions attached to an object. They specify what level of access a user, users, or groups have to an object. When dealing with firewalls, an ACL is a set of rules that apply to a list of network names, IP addresses. and port numbers. ...
Get CompTIA Security+ SY0-201 Cert Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.