CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Tebyan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید





  • Chapter 2


    A1:

    c

    A2:

    d

    A3:

    a

    A4:

    d

    A5:

    b

    A6:

    b,e

    A7:

    b,d

    A8:

    c

    A9:

    d

    A10:

    c

    A11:

    e

    A12:

    c

    Q&A

    1:

    What does a good network security policy allow?

    A1:

    A good network security policy allows the network administrators or security personnel to deploy security systems and software throughout the infrastructure, which includes providing to the administrative personnel the capacity to deploy IDSs, antivirus software, and other technologies in order to mitigate both existing threats and potential threats.

    2:

    What does the network security policy define?

    A2:

    The security policy defines the procedures that are used and the suggested guidelines to be implemented by security personnel and network administrators.

    3:

    How does a "defense-in-depth" approach work in network security?

    A3:

    A "defense-in-depth" approach involves the deployment of security as several layers within the network. If an attacker bypasses one layer, she still faces additional layers before she reaches critical network resources. This layered defense approach maximizes the security around critical resources.

    4:

    What is an OOB network used for in SAFE?

    A4:

    An OOB network is a network that carries only management traffic on it. It is completely separate from the network that carries the normal enterprise traffic.

    5:

    What can be used in place of an OOB network?

    A5:

    Encrypted communication can be used in place of an OOB network as long as both endpoints of the communication channel are secure.

    6:

    What is authentication?

    A6:

    Authentication is the determination that a user or administrator has the necessary credentials to access a device or system.

    7:

    What is authorization?

    A7:

    Authorization is the determination that a user or administrator has sufficient privileges to execute a command or a process.

    8:

    How does a NIDS work?

    A8:

    A NIDS works by monitoring network traffic for patterns of attack. Once an attack has been detected, the NIDS may simply raise an alarm on a management console, execute a block by inserting a new rule into a router's or firewall's ACL, or execute a TCP reset (for TCP connections only).

    9:

    How does a host-based IPS work?

    A9:

    A host-based IPS works by monitoring the host and attempting to detect illegal actions such as the replacement of a critical file or the execution of an illegal instruction in computer memory.

    10:

    Why is deployment critical to the success of the IDS?

    A10:

    As networks have grown tremendously over the past few years, the amount of traffic traversing the network wire has also increased. This results in the need to properly place the IDS at strategic locations throughout the network to maximize its effectiveness.

    11:

    How is SAFE able to accommodate emerging network applications?

    A11:

    SAFE accommodates emerging applications through the flexibility of the blueprint design. The deployment of new applications does not require a significant re-engineering of the network security state; rather, minor modifications can be made to provide access to these applications.

    12:

    What are the four types of threats faced by a network?

    A12:

    Internal threats, external threats, structured threats, and unstructured threats

    13:

    What are internal threats?

    A13:

    Internal threats are structured or unstructured threats from within the network, such as attacks initiated by disgruntled former or current employees.

    14:

    What are external threats?

    A14:

    External threats are structured or unstructured threats from outside the enterprise network, such as attacks initiated by "script kiddies."

    15:

    What are structured threats?

    A15:

    Structured threats are created by a lone attacker or a small group of attackers who are highly motivated and technically competent. Such threats typically involve sophisticated hacking techniques to bypass all security measures in order to penetrate the network.

    16:

    What are unstructured threats?

    A16:

    Unstructured threats primarily consist of random attackers using various common tools, such as malicious shell scripts, password crackers, credit card number generators, and dialer daemons.

  • / 290