-
5.1:
Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques) -
Define
-
5.2:
Describe security program elements (user awareness, training, and physical access control) -
Describe
-
5.3:
Configure and verify device access control using local passwords -
Configure
-
5.4:
Describe security password policies elements, such as management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics) -
Describe
-
5.5:
Describe IPsec remote access and site-to-site VPNs -
Describe
-
5.6:
Configure and verify access control lists -
Configure
-
5.7:
Configure and verify Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security) -
Configure
-
5.8:
Compare authentication, authorization, and accounting concepts -
Compare
-
5.9:
Describe wireless security protocols (WPA, WPA2, and WPA3) -
Describe
-
5.10:
Configure and verify WLAN within the GUI using WPA2 PSK -
Configure