8.9. Exam Essentials

Be able to identify proper security implementation procedures. Security implementation is primarily a matter of allowing people who should access something the ability to do so and preventing nonauthorized users from accessing the same thing. It also involves doing so with a minimum of steps and fuss. Network security involves such procedures as securing the workstations and servers, setting proper passwords, and providing proper network protection.

Be able to identify the different types of firewall technologies. Firewall technologies include true NAT, proxy, access control list, and dynamic packet filtering.

Be able to identify the need for a firewall. Any network that is connected directly to the Internet needs some kind ...

Get Network+™: Study Guide, Fourth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.