Upon completion of this chapter, you will be able to answer the following questions:
What devices and protocols are used in a small network?
How does a small network serve as the basis for a larger network?
Why are basic security measures required on network devices?
What security vulnerabilities and common ...