Explanation should include
- firewalls
- port security
- router access lists
- network intrusion detection systems (NIDS)
- authentication protocols
- public key infrastructure (PKI)
- virtual private network (VPN)
- IPSec
- virtual local area network (VLAN)
- security zones.