Information Technology Reference
In-Depth Information
Exam Preparation Tasks
Review All Key Topics
Review the most important topics in the chapter, noted with the Key Topic icon in the
outer margin of the page. Table 12-12 lists a reference of these key topics and the page
numbers on which each is found.
Ta b l e 1 2 -1 2
Key Topics
Key Topic Element
Description
Page
Ta ble 1 2 - 2
Security legislation
449
Ta ble 1 2 - 3
Security threats
450
Ta ble 1 2 - 4
Security risks
453
Ta ble 1 2 - 5
Software features to manage DoS attacks
454
Ta ble 1 2 - 6
Key network security elements of the network
security life cycle
457
Ta ble 1 2 -7
Security policy documents
459
Ta ble 1 2 - 9
Steps for continuous security
462
List
Two ways to send a key to the remote endpoint
467
List
VPN protocols
467
List
Security management solutions
472
Complete Tables and Lists from Memory
Print a copy of Appendix D, “Memory Tables,” (found on the CD), or at least the section
for this chapter, and complete the table s and lists from memor y. Appendix E, “Memor y
Ta ble s A n s wer Ke y, ” a l s o on t he C D, i nc l ude s c om ple te d t a ble s a nd l i s t s to c he c k you r
work.
 
 
 
 
Search WWH ::




Custom Search