Appendix D. Memory Tables Answer Key
Chapter 3
Table 3-2 Server-Based vs. Agent-Based Scanning
Chapter 8
Table 8-2 Advantages and Disadvantages of SSL/TLS
Table 8-3 Examples of Logging Configuration Settings
Table 8-4 Symmetric Algorithm Strengths and Weaknesses
Table 8-5 Symmetric Algorithms Key Facts
Table 8-6 Asymmetric Algorithm Strengths and Weaknesses
Table 8-7 Applying Cryptography
Chapter 9
Table 9-2 Comparing Black-Box, Gray-Box, and White-Box Testing
Table 9-3 Authentication Protocols
Table 9-4 RADIUS and TACACs+
Chapter 11
Chapter 12
Table 12-2 Advantages and Disadvantages of NGFWs
Table 12-3 Pros and Cons of Firewall Types
Table 12-4 RADIUS vs. TACACS+
Chapter 15
Table 15-2 Control Objectives of PCI DSS
Chapter 21
Table 21-3 SABSA Framework Matrix
Table 21-8 SOC Report Comparison Chart
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.