Page 850 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 850
and CSMA/CD; token passing; and polling.
Understand secure network architecture and design. Network
security should take into account IP and non-IP protocols, network
access control, using security services and devices, managing
multilayer protocols, and implementing endpoint security.
Understand the various types and purposes of network
segmentation. Network segmentation can be used to manage traffic,
improve performance, and enforce security. Examples of network
segments or subnetworks include intranet, extranet, and DMZ.
Understand the different wireless technologies. Cell phones,
Bluetooth (802.15), and wireless networking (802.11) are all called
wireless technologies, even though they are all different. Be aware of
their differences, strengths, and weaknesses. Understand the basics of
securing 802.11 networking.
Understand Fibre Channel. Fibre Channel is a form of network
data storage solution (i.e., SAN (storage area network) or NAS
(network-attached storage)) that allows for high-speed file transfers.
Understand FCoE. FCoE (Fibre Channel over Ethernet) is used to
encapsulate Fibre Channel communications over Ethernet networks.
Understand iSCSI. iSCSI (Internet Small Computer System
Interface) is a networking storage standard based on IP.
Understand 802.11 and 802.11a, b, g, n, and ac. 802.11 is the
IEEE standard for wireless network communications. Versions include
802.11 (2 Mbps), 802.11a (54 Mbps), 802.11b (11 Mbps), 802.11g (54
Mbps), 802.11n (600 Mbps), and 802.11ac (1.3+ Mbps). The 802.11
standard also defines Wired Equivalent Privacy (WEP).
Understand site survey. A site survey is the process of
investigating the presence, strength, and reach of wireless access
points deployed in an environment. This task usually involves walking
around with a portable wireless device, taking note of the wireless
signal strength, and mapping this on a plot or schematic of the
building.
Understand WPA2. WPA2 is a new encryption scheme known as

