Appendix C. Memory Tables

Chapter 1

Table 1-2 Security Terms


Table 1-5 Additional Attack Methods


Chapter 2

Table 2-3 The Who, What, and Why of Security Policies


Chapter 3

Table 3-2 Borderless Network Components


Chapter 4

Table 4-2 Components of a Threat Control and Mitigation Strategy

Table 4-4 Protecting the Data Plane

Chapter 5

Table 5-3 Properties ...

Get CCNA Security 640-554 Official Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.