O'Reilly logo

CSI Exam Cram™ 2 (Exam 642-541) by Annlee Hines

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11. The Medium Network Implementation

Terms you'll need to understand:

  • Headend

  • Man-in-the-middle attack

  • Network topology discovery

  • Password attack

  • Trust exploitation

Techniques you'll need to master:

  • Performing a threat analysis for VPN services

  • Analyzing design alternatives

In this chapter, we do with the medium network what we did with the small network in the last chapter—look at it from these five points of view:

  • Assets to be protected

  • Threats to those assets

  • Devices used and their implementation and configuration

  • Threats mitigated

  • Design alternatives

In the case of the medium business network, however, we're talking about a larger and more complex edge, although the campus is the same architecturally (even if it has more hosts). The medium network ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required