O'Reilly logo

CompTIA Network N10-006 Quick Reference by Anthony Sequeira

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 17. Network Hardening

To reduce the effectiveness of attacks and misuse, security controls can be implemented and configurations made to improve the security posture for network devices and hosts that connect to those networks. This chapter covers many of those techniques.

Anti-Malware Software—This is intended to identify and prevent malicious software from running. Anti-malware software can be either host-based or network-based. Host-based software runs on a single computer and protects that computer. Network-based software runs on a device that is looking at all the traffic on the network to determine whether malware is being sent or received. A cloud-based anti-malware service can be used for dynamic updates.

Switch Port Security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required