O'Reilly logo

Security+ Training Guide by Todd King

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter Summary

This chapter provided an overview of basic security concepts and controls that can be used by administrators to secure physical devices and media. One of the most important topics, controlling who can access the network and how, was further expanded.

KEY TERMS

  • Degaussing

  • Demilitarized zone (DMZ)

  • Extranet

  • FCAPS

  • Firewall

  • Intranet

  • Intrusion detection system (IDS)

  • Magnetic overwrite

  • Network address translation (NAT)

  • Public branch exchange (PBX)

  • Public switched telephone network (PSTN)

  • Reconnaissance

  • Remote monitoring (RMON)

  • Router

  • Shielded twisted pair (STP)

  • Simple Network Management Protocol (SNMP)

  • Switch

  • Unshielded twisted pair (UTP)

  • Virtual local area network (VLAN)

Firewalls are the focal points of overall network access policy. Several types of ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required