CCSP CSI Exam Cram 2 (Exam Cram 642-541)

[A] [B] [C] [D] [E] [F] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

man-in-the-middle attack  

management   2nd   3rd  

       communications

               modular approach of OSI   2nd  

       remote users   2nd  

       routers

               securing access   2nd   3rd   4th  

       sources of internal threats  

       switches

               securing  

Management module   2nd  

mapping

       networks   2nd  

medium networks   2nd  

       assets  

       branch/headend   2nd  

       Campus  

               assets   2nd  

               design   2nd  

               implementing   2nd  

               mitigating threats   2nd  

               threats   2nd  

       design   2nd  

       exam prep questions   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       implmenting   2nd   3rd   4th   5th  

       threats   2nd   3rd   4th   5th  

       WAN  

mismanagement

       sources of internal threats  

mitigation

       threats

               Campus module   2nd  

               medium networks   2nd   3rd   4th  

               remote users   2nd  

               small networks   2nd  

               whitepapers.   [See also whitepapers]

mixed deployments

       VPNs  

models

       Enterprise SAFE   2nd  

       OSI

               campus modules   2nd   3rd   4th   5th  

               edge modules   2nd   3rd   4th   5th   6th   7th   8th   9th  

               modular approach of   2nd   3rd   4th   5th  

modular approach of OSI   2nd   3rd   4th   5th  

       campus modules   2nd   3rd   4th   5th  

       edge modules   2nd   3rd   4th   5th   6th   7th   8th   9th  

modules

       Corporate Internet

               SMR  

       Enterprise SAFE model   2nd   3rd  

               campus modules   2nd   3rd   4th   5th  

               edge modules   2nd   3rd   4th   5th   6th   7th   8th   9th  

       medium networks   2nd  

               assets  

               branch/headend   2nd  

               Campus   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

               design   2nd  

               implementing   2nd   3rd   4th   5th  

               threats   2nd   3rd   4th   5th  

               WAN  

       small networks  

               assets   2nd  

               branches/standalone organizations  

               Campus   2nd   3rd   4th   5th   6th   7th   8th  

               design   2nd  

               devices   2nd   3rd   4th  

               mitigating threats   2nd  

               threats   2nd   3rd   4th  

Monitor stage (security wheel)   2nd  

monitoring

       security wheel   2nd  

               Improve stage  

               Monitor stage   2nd  

               Secure stage   2nd  

               Test stage  

multiprotocol tunneling  

multipurpose devices, VPNs  

Категории