Chapter Introduction |
|
16.1 |
16.1 |
Outline security requirements based on customer
needs |
16.1.1 |
Outline a
local security policy |
16.1.2 |
Explain
when and how to use security hardware |
16.1.3 |
Explain when and how to use security application software |
|
|
16.2 |
16.2 |
Select security components based on customer needs |
16.2.1 |
Describe and compare security techniques |
16.2.2 |
Describe and compare access control devices |
16.2.3 |
Describe and compare firewall types |
|
|
16.3 |
16.3 |
Implement customer's security policy |
16.3.1 |
Configure security settings |
16.3.2 |
Describe configuring firewall types |
16.3.3 |
Describe protection against malicious software |
|
|
16.4 |
16.4 |
Perform preventive maintenance on security |
16.4.1 |
Describe the configuration of operating system updates |
16.4.2 |
Maintain accounts |
16.4.3 |
Explain data backup procedures, access to backups, and securing physical backup media |
|
|
16.5 |
16.5 |
Troubleshoot security |
16.5.1 |
Review the troubleshooting process |
16.5.2 |
Identify common problems and solutions |
16.5.3 |
Apply troubleshooting skills |
|
|
Chapter Summary |
|
Chapter
Quiz
|
|