Appendix B. Memory Tables
Table 1-2 Protocols at Each Layer of the TCP/IP Model
Table 1-3 Message Unit Naming at Each Layer of the TCP/IP Model
Table 1-4 Protocols and Devices Mapping to the OSI Layer Model and the TCP/IP Model
Table 1-5 Popular Ethernet Physical Layer Standards
Table 1-6 Spanning Tree Port Costs
Table 2-1 RFC 1918 Private Address Ranges
Table 4-2 Authentication Methods
Table 4-3 Access Control Process Phases
Table 4-5 Mapping Access Controls to Access Control Types
Table 4-6 Overview of Access Control Models
Table 4-7 Pros and Cons of Access Control Models
Table 4-8 RADIUS vs. TACACS+ Comparison
Table 4-9 IDS vs. IPS Comparison
Table 4-10 Network-Based Vs. Host-Based Detection/Prevention Systems
Table 4-11 Network-Based Vs. Host-Based Antivirus/Antimalware Systems
Table 5-2 Summary of Password-Generation Methods
Table 5-6 Comparing Cloud-Based MDM and On-Premises MDM
Table 5-7 Comparing Vulnerability Scan and Penetration Assessment
Table 7-2 IPsec Attributes
Table 7-3 Contrasting Cisco VPN Client and SSL VPN
Table 9-2 List of Permission Values
Table 9-3 UNIX Facilities
Table 9-4 UNIX Message Priorities
Table 11-2 Syslog Severity Logging Levels
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.