Home > Articles > Cisco > CCNP Security

  • Print
  • + Share This
This chapter is from the book

Exam Preparation Tasks

Review All the Key Topics

Review the most important topics from the chapter, noted with the Key Topic icons in the margin of the page. Table 1-8 lists a reference of these key topics and the page numbers on which each is found.

keytopic.jpg

Table 1-8 Key Topics for Chapter 1

Key Topic Element

Description

Page Number

Figure 1-1

Intrusion Detection System

9

Paragraph

Security Controls Classifications

9

Figure 1-2

Intrusion Prevention System

10

Table 1-2

Signature-Based Features and Limitations

14

Table 1-3

Anomaly-Based Features and Limitations

15

Table 1-4

Policy-Based Features and Limitations

15

Table 1-5

Features and Limitations of Endpoint Security

16

Table 1-6

Host IPS and Network IPS

18

Table 1-7

Defense-in-Depth: Host-Focused and Network-Focused Technology

20

Complete the Tables and Lists from Memory

Print a copy of Appendix C, “Memory Tables” (found on the CD), or at least the section for this chapter, and complete the tables and lists from memory. Appendix D, “Memory Tables Answer Key,” also on the CD, includes completed tables and lists to check your work.

Define Key Terms

Define the following key terms from this chapter, and check your answers in the glossary:

  • vulnerability
  • exploit
  • risk
  • threat
  • signature
  • anomaly
  • + Share This
  • 🔖 Save To Your Account