Exploration may include the following:
- Firewall/Unified Threat Management (UTM)
- Access Control List (ACL)
- Application-based vs. network-based
- Stateful vs. stateless packet inspection
- Default deny
- Switch
- Port security
- Network layer 2 vs. layer 3
- Loop prevention
- Flood guard
- Router
- Proxy
- Forward and reverse proxy
- Transparent proxy
- Application/multipurpose
- Load balancer
- Scheduling
- Active-passive
- Active-active
- Virtual IPs
- Access point
- Service Set Identifier (SSID)
- MAC filtering
- Signal strength
- Band selection/width
- Antenna types and placement
- Fat vs. thin
- Controller-based vs. standalone bridge
- Network Access Control (NAC)
- Dissolvable vs. permanent
- Host health checks
- Agent vs. agentless
Process/Skill Questions:
- What security features can be implemented on/with a firewall?
- How does the proxy protect the end user?
- How does load balancer introduce security into the organization?