Page 850 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 850

and CSMA/CD; token passing; and polling.

               Understand secure network architecture and design. Network
               security should take into account IP and non-IP protocols, network

               access control, using security services and devices, managing
               multilayer protocols, and implementing endpoint security.

               Understand the various types and purposes of network
               segmentation. Network segmentation can be used to manage traffic,
               improve performance, and enforce security. Examples of network
               segments or subnetworks include intranet, extranet, and DMZ.


               Understand the different wireless technologies. Cell phones,
               Bluetooth (802.15), and wireless networking (802.11) are all called
               wireless technologies, even though they are all different. Be aware of
               their differences, strengths, and weaknesses. Understand the basics of
               securing 802.11 networking.

               Understand Fibre Channel. Fibre Channel is a form of network
               data storage solution (i.e., SAN (storage area network) or NAS

               (network-attached storage)) that allows for high-speed file transfers.

               Understand FCoE. FCoE (Fibre Channel over Ethernet) is used to
               encapsulate Fibre Channel communications over Ethernet networks.

               Understand iSCSI. iSCSI (Internet Small Computer System
               Interface) is a networking storage standard based on IP.

               Understand 802.11 and 802.11a, b, g, n, and ac. 802.11 is the
               IEEE standard for wireless network communications. Versions include
               802.11 (2 Mbps), 802.11a (54 Mbps), 802.11b (11 Mbps), 802.11g (54

               Mbps), 802.11n (600 Mbps), and 802.11ac (1.3+ Mbps). The 802.11
               standard also defines Wired Equivalent Privacy (WEP).

               Understand site survey. A site survey is the process of
               investigating the presence, strength, and reach of wireless access
               points deployed in an environment. This task usually involves walking
               around with a portable wireless device, taking note of the wireless

               signal strength, and mapping this on a plot or schematic of the
               building.

               Understand WPA2. WPA2 is a new encryption scheme known as
   845   846   847   848   849   850   851   852   853   854   855