- "Do I Know This Already?" Quiz
- Physical Security Measures
- Logical Security Concepts
- Wireless Security Protocols and Authentication
- Malware Removal and Prevention
- Social Engineering Threats and Vulnerabilities
- Microsoft Windows OS Security Settings
- Security Best Practices to Secure a Workstation
- Securing Mobile Devices
- Data Destruction and Disposal
- Configuring Security on SOHO Networks
- Exam Preparation Tasks
- Review All the Key Topics
- Define Key Terms
- Answer Review Questions
Review All the Key Topics
Review the most important topics in the chapter, noted with the Key Topic icon in the outer margin of the page. Table 7-2 lists these key topics and the page numbers on which each is found.
Table 7-2 Key Topics for Chapter 7
Key Topic Element |
Description |
Page Number |
---|---|---|
List |
Active Directory Service basics |
694 |
List |
Built-in OS firewalls |
698 |
List |
Strong password characteristics |
699 |
Section |
Directory Permissions |
699 |
Section |
Wireless protocols and encryption types |
702 |
Section |
Malware Types |
704 |
List |
Antivirus/anti-malware protection techniques |
707 |
Section |
Backup/Restore |
708 |
Steps |
Enabling/configuring Time Machine |
709 |
List |
Characteristics of an acceptable use policy (AUP) |
711 |
Paragraphs |
Firewalls/DNS |
712 |
Section |
Social Engineering/Attack Types |
714 |
Section |
Windows OS Security Settings |
719 |
Section |
Shared Files and Folders |
721 |
Paragraph |
Single Sign-on (SSO) |
723 |
List |
Drive encryption requirements |
723 |
Steps |
Encrypting files |
724 |
Section |
Password Best Practice |
725 |
Section |
Account Management |
728 |
List |
Securing mobile devices |
735 |
List |
Physical destruction methods |
741 |
List |
Recycling/repurposing best practices |
742 |
Section |
Wireless-Specific Security |
743 |
Steps |
Updating SOHO router firmware |
750 |
List |
Physical security best practices in a SOHO network environment |
750 |