Summary
This chapter covered secure baselines and their importance to device security. This included an exploration of deployment and maintenance methods, as well as the aspects of hardening our network devices to protect them against attacks. Later sections discussed the planning and maintenance of a wireless network, mobile device management considering various models and security methods, and a review of application security, sandboxing, and monitoring methodologies.
The knowledge gained in this chapter will prepare you to answer any questions relating to Exam Objective 4.1 in your CompTIA Security+ certification exam.
The next chapter of the book is Chapter 15, Explain the security implications of proper hardware, software, and data asset management.