Upon completion of this chapter, you will be able to answer the following questions:
What are the devices and protocols used in a small network?
How does a small network serve as the basis of larger networks?
Why are basic security measures needed on network devices?
What are security vulnerabilities and general ...