Page 27 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 27

FIGURE 9.2 The process scheduler

                    Chapter 10


                        FIGURE 10.1 A typical wiring closet
                        FIGURE 10.2 The fire triangle


                        FIGURE 10.3 The four primary stages of fire

                        FIGURE 10.4 A secure physical boundary with a mantrap and
                        a turnstile

                    Chapter 11

                        FIGURE 11.1 Representation of the OSI model

                        FIGURE 11.2 Representation of OSI model encapsulation

                        FIGURE 11.3 Representation of the OSI model peer layer
                        logical channels

                        FIGURE 11.4 OSI model data names


                        FIGURE 11.5 Comparing the OSI model with the TCP/IP
                        model

                        FIGURE 11.6 The four layers of TCP/IP and its component
                        protocols

                        FIGURE 11.7 The TCP three-way handshake

                        FIGURE 11.8 Single-, two-, and three-tier firewall deployment
                        architectures

                        FIGURE 11.9 A ring topology


                        FIGURE 11.10 A linear bus topology and a tree bus topology

                        FIGURE 11.11 A star topology

                        FIGURE 11.12 A mesh topology

                    Chapter 13

                        FIGURE 13.1 Graph of FRR and FAR errors indicating the
                        CER point

                    Chapter 14
   22   23   24   25   26   27   28   29   30   31   32