Exam Essentials

Be able to identify proper security implementation procedures.  Security implementation is primarily a matter of allowing people who should access something the ability to do so and preventing non-authorized users from accessing the same thing. It also involves doing so with a minimum of steps and fuss. Network security involves such procedures as securing the workstations and servers, setting proper passwords, and proper network protection.

Be able to identify the different types of firewall technologies.  Firewall technologies include true NAT, proxy, access control list, and dynamic packet filtering.

Be able to identify the need for a firewall.  Any network that is connected directly to the Internet needs some kind of firewall to protect the entire network from potential attack from somewhere on the Internet.

Be able to identify the different types of proxy servers.  A proxy server acts on behalf of a client. Most often, a proxy server is characterized by the service or protocol it is “proxying” (e.g., HTTP proxy for HTTP requests).

Be able to predict the impact of implementing a particular security scenario on network functionality.  Any increase in network security decreases the speed of a user’s network access because they have one more level of security to get through before they can do their job. Therefore, the tighter the security, the less functionality you can get out of a network, but the more network stability you will achieve.

Be able to differentiate between a proxy and Network Address Translation (NAT).  Proxy servers act on behalf of a client, whereas NAT simply changes “from” addresses as the packets pass through the proxy server.




Network+ Study Guide
Network+ Study Guide
ISBN: 470427477
EAN: N/A
Year: 2002
Pages: 151

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net