Information Technology Reference
In-Depth Information
Exam Preparation Tasks
Review All Key Topics
Review the most important topics in the chapter, noted with the Key Topic icon in the
outer margin of the page. Table 13-7 lists a reference of these key topics and the page
numbers on which each is found.
Ta b l e 1 3 -7
Key Topics
Key Topic Element
Description
Page
Summary
Cisco Security Control Framework
486
List
Tr u st and Ident it y technolo g ie s
486
List
Detecting and mitigating threats
490
List
Security platform solutions
495
List
Integrating security into network devices
497
Ta ble 1 3 - 3
Integrated security for Cisco IOS
498
List
Cisco security appliances
499
List
Catalyst 6500 service modules
500
Ta ble 1 3 - 4
Security in the campus
502
Ta ble 1 3 - 5
Security in the data center
504
Ta ble 1 3 - 6
Security in the enterprise edge
505
Complete Tables and Lists from Memory
Print a copy of Appendix D, “Memory Tables,” (found on the CD), or at least the section
for this chapter, and complete the table s and lists from memor y. Appendix E, “Memor y
Ta ble s A n s wer Ke y, ” a l s o on t he C D, i nc l ude s c om ple te d t a ble s a nd l i s t s to c he c k
your work.
 
 
 
 
Search WWH ::




Custom Search