8.3.1 and 8.3.2:Table 5-2 identifies common methods to mitigate security threats.
Table 5-2. Network Protection Options
With Safari, you learn the way you learn best. Get unlimited access to videos, live online training,
learning paths, books, interactive tutorials, and more.