Physical Security Controls
Actions for Physical Security Controls
1. Identify the malicious threat sources to physical security and their corresponding countermeasures
Network Devices, Topologies, and Network Attacks
Actions for Network Devices, Topologies, and Network Attacks
2. Describe the different Wireless standards within the 802.11 family. What is a rogue access point, and what do we have to worry about?
3. The Transport layer provides two service protocols: UDP and TCP. Explain the differences between the two protocols in terms of guaranteed vs. non-guaranteed service and connection oriented versus connectionless communication.