WEEK 1: Chapter 1: Modern Network Security Threats

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Connections to untrusted networks must be checked in-depth by multiple layers of defense before reaching enterprise resources

CAN

A consumer-grade router with basic security features is used to protect inside assets from the outside attackers

SOHO

Core components, such as Secure Segmentation, Threat Defense, and Visibility, are used as part of an easy to implement yet comprehensive strategy

Cloud

VPN technologies implemented on ASA devices and high-speed Nexus switches are used to connect the off-site facility to corporate sites

Data Center

Secure devices, such as an ASA, are used on the edge of the networks to provide stateful firewall features and establish secure VPN tunnels to various destinations

WAN


Set pelajaran terkait

Auditing Exam 3 Chapters 10,11,12,14

View Set

Sawyers ELA Word to Know REALLY WELL

View Set

Valley Modules 9 and 10: Cardiovascular, Valvular Heart Disease, and Hemostasis

View Set

History of American Popular Music Unit 14 Quiz

View Set