CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Greg Bastien; Earl Carter; Christian Degu

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید






  • "Do I Know This Already?" Quiz


    The purpose of the "Do I Know This Already?" quiz is to help you decide if you really need to read the entire chapter. If you already intend to read the entire chapter, you do not necessarily need to answer these questions now.

    The ten-question quiz, derived from the major sections in the "Foundation and Supplemental Topics" portion of the chapter, helps you determine how to spend your limited study time.

    1.

    Which single method is the best way to secure a network?

    1. Allow dialup access only to the Internet

    2. Install a personal firewall on every workstation

    3. Use very complex passwords

    4. Implement strong perimeter security

    5. None of the above

    2.

    What are the three types of cyber attacks? (Choose three.)

    1. Penetration attack

    2. Access attack

    3. Denial of service attack

    4. Destruction of data attack

    5. Reconnaissance attack

    3.

    What type of threat is directed toward a specific target normally for a specific purpose?

    1. Structured threats

    2. Directed threats

    3. Unstructured threats

    4. Political threats

    5. None of the above

    4.

    What type of threat normally scans networks looking for "targets of opportunity"?

    1. Structured threats

    2. Scanning threats

    3. Unstructured threats

    4. Script kiddies

    5. None of the above

    5.

    What type of scan looks for all services running on a single host?

    1. Ping sweep

    2. Service scan

    3. Horizontal scan

    4. Vertical scan

    5. All of the above

    6.

    What type of attack determines the address space assigned to an organization?

    1. Ping sweep

    2. DNS queries

    3. Vertical scan

    4. Horizontal scan

    5. None of the above

    7.

    What are the steps of the security process?

    1. Secure, test, repair, retest

    2. Test, repair, monitor, evaluate

    3. Lather, rinse, repeat

    4. Evaluate, secure, test

    5. None of the above

    8.

    What constant action sits between the individual steps of the security process?

    1. Test

    2. Retest

    3. Evaluate

    4. Repair

    5. Improve

    9.

    True or false: Cisco AVVID uses only Cisco products.

    10.

    Which of the following is not a component of Cisco SAFE?

    1. Perimeter security

    2. Policy implementation

    3. Identity

    4. Security management and monitoring

    5. Application security

    The answers to the "Do I Know This Already?" quiz are found in Appendix A, "Answers to the 'Do I Know This Already?' Quizzes and Q&A Sections." The suggested choices for your next step are as follows:


    • / 191