Exam Preparation Tasks
Review All the Key Topics
Review the most important topics from the chapter, noted with the Key Topic icons in the margin of the page. Table 1-8 lists a reference of these key topics and the page numbers on which each is found.
Table 1-8 Key Topics for Chapter 1
Key Topic Element |
Description |
Page Number |
Intrusion Detection System |
||
Paragraph |
Security Controls Classifications |
9 |
Intrusion Prevention System |
||
Table 1-2 |
Signature-Based Features and Limitations |
14 |
Table 1-3 |
Anomaly-Based Features and Limitations |
15 |
Table 1-4 |
Policy-Based Features and Limitations |
15 |
Table 1-5 |
Features and Limitations of Endpoint Security |
16 |
Table 1-6 |
Host IPS and Network IPS |
18 |
Table 1-7 |
Defense-in-Depth: Host-Focused and Network-Focused Technology |
20 |
Complete the Tables and Lists from Memory
Print a copy of Appendix C, “Memory Tables” (found on the CD), or at least the section for this chapter, and complete the tables and lists from memory. Appendix D, “Memory Tables Answer Key,” also on the CD, includes completed tables and lists to check your work.
Define Key Terms
Define the following key terms from this chapter, and check your answers in the glossary:
- vulnerability
- exploit
- risk
- threat
- signature
- anomaly