background image
C
H
A
P
T
E
R
15
Network Security Technologies
The CCDP exam requires you to have an in-depth understanding of firewall technologies.
In this chapter, the discussion focuses on an overview of security technologies and some of
the major components in today's network designs. Security technologies commonly used
to establish identity (public and private keys) are described, and so are methods of ensuring
some degree of data integrity and confidentiality.
How to Best Use This Chapter
By following these steps, you can make better use of your study time:
·
Keep your notes and the answers for all your work with this book in one place for easy
reference.
·
Take the "Do I Know This Already?" quiz and write down your answers. Studies show
that retention is significantly increased through writing down facts and concepts, even
if you never look at the information again.
·
Use the diagram shown in Figure 15-1 to guide you to the next step.
Figure 15-1
How to Best Use this Chapter
Low
score
Low quizlet
score
Medium
score
High score,
want more
review
High
score
ТDo I Know This Already?У quiz
Read
Foundation
Topics
Read related
Foundation Topics
subsection
Read
Foundation
Summary
Q&A
Scenarios
Go to next
chapter
If you skip to the Foundation Summary, Q&A, and Scenarios sections and have
trouble with the material there, you should go back to the Foundation Topics section.
87200333.book Page 551 Wednesday, August 22, 2001 1:41 PM