O'Reilly logo

CCNA Security 640-554 Official Cert Guide by Scott Morris, Keith Barker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix C. Memory Tables

Chapter 1

Table 1-2 Security Terms

Image

Table 1-5 Additional Attack Methods

Image

Chapter 2

Table 2-3 The Who, What, and Why of Security Policies

Image

Chapter 3

Table 3-2 Borderless Network Components

Image

Chapter 4

Table 4-2 Components of a Threat Control and Mitigation Strategy

Table 4-4 Protecting the Data Plane

Chapter 5

Table 5-3 Properties ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required