| < Day Day Up > |
|
Before taking the exam, review the key topics and terms that are presented in this chapter. You need to know this information.
Understand the various roles that client computers play on the network and how each role should be configured separately.
Be familiar with the tools you can use to control client systems, including how to configure and deploy software restrictions, how to limit a user’s access to the graphical interface, and how to protect the data on a computer in the event of theft.
Know the major roles that server computers fulfill on a network, and know how security should be configured for each. Understand how firewalls and perimeter networks should be used to create barriers between public and private networks.
Be able to configure packet filters to allow legitimate traffic to and from various server roles.
Understand the role that logging plays in identifying successful and unsuccessful attacks. Be able to configure logging for common server roles.
Be able to use several different tools to analyze a computer’s security configuration and the status of critical updates on the computer.
denial-of-service attack An attack that prevents users from using network resources.
firewallA system that creates a boundary between a public and private network.
man-in-the-middle attack A security attack in which an attacker intercepts and possibly modifies data that is transmitted between two users. To each user, the attacker pretends to be the other user. During a successful man-in-the-middle attack, the users are unaware that there is an attacker between them who is intercepting and modifying their data. Also referred to as a bucket brigade attack.
packet filter A basic function of firewalls that examines incoming and outgoing packets and drops packets based on predefined criteria, such as port numbers, source IP address, and destination IP address.
perimeter network A small network that is set up separately from an organization’s private network and the Internet. A perimeter network provides a layer of protection for internal systems in the event that a system offering services to the Internet is compromised. Also known as a demilitarized zone (DMZ) or a screened subnet.
| < Day Day Up > |
|