Appendix C. Memory Tables Answer Key

Chapter 1

Image

Table 1-2 Protocols at Each Layer of the TCP/IP Model

Image

Table 1-3 Message Unit Naming at Each Layer of the TCP/IP Model

Image

Table 1-4 Protocols and Devices Mapping to the OSI Layer Model and the TCP/IP Model

Image

Table 1-5 Popular Ethernet Physical Layer Standards

Image

Table 1-6 Spanning Tree Port Costs

Image

Table 1-23 TCP Services

Chapter 2

Image

Table 2-1 RFC 1918 Private Address Ranges

Chapter 4

Image

Table 4-2 Authentication Methods

Image

Table 4-3 Access Control Process Phases

Image

Table 4-5 Mapping Access Controls to Access Control Types

Image

Table 4-6 Overview of Access Control Models

Image

Table 4-7 Pros and Cons of Access Control Models

Image

Table 4-8 RADIUS vs. TACACS+ Comparison

Image

Table 4-9 IDS vs. IPS Comparison

Image

Table 4-10 Network-Based Vs. Host-Based Detection/Prevention Systems

Image

Table 4-11 Network-Based Vs. Host-Based Antivirus/Antimalware Systems

Chapter 5

Image

Table 5-2 Summary of Password-Generation Methods

Image

Table 5-6 Comparing Cloud-Based MDM and On-Premises MDM

Image

Table 5-7 Comparing Vulnerability Scan and Penetration Assessment

Chapter 7

Image

Table 7-2 IPsec Attributes

Image

Table 7-3 Contrasting Cisco VPN Client and SSL VPN

Chapter 9

Image

Table 9-2 List of Permission Values

Image

Table 9-3 UNIX Facilities

Image

Table 9-4 UNIX Message Priorities

Chapter 11

Image

Table 11-2 Syslog Severity Logging Levels

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.137.218.5