Glossary
This glossary contains the key terms from the book. All the terms from each chapter’s “Define Key Terms” tasks are defined here.
10 tape rotation
A backup rotation scheme in which ten backup tapes are used over the course of two weeks.
802.1X
An authentication technology used to connect devices to a LAN or WLAN. It is an example of port-based NAC.
acceptable use
Acceptable usage policies define the rules that restrict how a computer, network, or other system may be used.
access control list (ACL)
A list of permissions attached to an object. They specify what level of access a user, users, or groups have to an object. When dealing with firewalls, an ACL is a set of rules that apply to a list of network names, IP addresses. and port numbers. ...
Get CompTIA Security+ SY0-301 Authorized Cert Guide, Deluxe Edition, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.