Appendix C. Memory Tables

Chapter 1

Table 1-2 Security Terms

Image

Table 1-5 Additional Attack Methods

Image

Chapter 2

Table 2-3 The Who, What, and Why of Security Policies

Image

Chapter 3

Table 3-2 Borderless Network Components

Image

Chapter 4

Table 4-2 Components of a Threat Control and Mitigation Strategy

Table 4-4 Protecting the Data Plane

Chapter 5

Table 5-3 Properties ...

Get CCNA Security 640-554 Official Cert Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.