System information
106 Chapter 3: Defending the Perimeter
Exam Preparation Tasks
Review All the Key Topics
Review the most important topics from this chapter, denoted with the Key Topic icon. Table
3-12 lists these key topics and the page where each is found.
Complete the Tables and Lists from Memory
Print a copy of Appendix D, “Memory Tables,” (found on the CD) or at least the section for
this chapter, and complete the tables and lists from memory. Appendix E, “Memory Tables
Answer Key,” also on the CD, includes completed tables and lists so that you can check
your work.
Definition of Key Terms
Define the following key terms from this chapter, and check your answers in the glossary:
Integrated Services Router (ISR), dictionary attack, brute-force attack,
privilege level, role-based command-line interface (CLI) view, bootset, Cisco
Security Device Manager (SDM)
Table 3-12 Key Topics for Chapter 3
Key Topic Element Description
Page
Number
Table 3-2 IOS security features
81
List ISR enhancements
85
Table 3-7 Passwords configured during the SETUP script
88
Table 3-8 Cisco IOS Resilient Configuration steps
96
List Requirements added by Cisco IOS Login
Enhancements for Virtual Connections
96
Example 3-18 Creating a message-of-the-day banner
99
List Cisco SDM benefits
100
Table 3-11 Cisco SDM wizards
103-104