Glossary

This glossary contains the key terms from the book. All the terms from each chapter’s “Define Key Terms” tasks are defined here.

10 tape rotation

A backup rotation scheme in which 10 backup tapes are used over the course of 2 weeks.

802.1X

An authentication technology used to connect devices to a LAN or WLAN. It is an example of port-based NAC.

acceptable use

Acceptable usage policies define the rules that restrict how a computer, network, or other system may be used.

access control list (ACL)

A list of permissions attached to an object. They specify what level of access a user, users, or groups have to an object. When dealing with firewalls, an ACL is a set of rules that apply to a list of network names, IP addresses. and port numbers. ...

Get CompTIA Security+ SY0-201 Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.