CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Tebyan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید





  • Chapter 5



    A1:

    f

    A2:

    e

    A3:

    d

    A4:

    b

    A5:

    a

    A6:

    a

    A7:

    b,d

    A8:

    e

    A9:

    e

    A10:

    a

    A11:

    a,b,c,d

    Q&A

    1:

    What are the three elements of a good security policy?

    A1:

    The three elements of a good security policy are that the policy must be capable of being implemented; must clearly define the areas of responsibility and the roles of users, administrators, and managers; and must be enforceable and applicable to everyone.

    2:

    What are some of the more common threats described in RFC 2196?

    A2:

    RFC 2196 describes three common threats to a network:

    • The unauthorized access to resources or information

    • The unintentional and unauthorized disclosure of information

    • Denial of service

    3:

    What are the key trade-offs that define the corporate security goals?

    A3:

    The key trade-offs that define the corporate security goals are as follows:

    • Services offered versus the security provided

    • Ease of use versus security

    • Cost of security versus risk of loss

    4:

    Within the field of network security, what does CIA stand for?

    A4:

    Confidentiality, integrity, and availability

    5:

    What are some of the physical assets of a network?

    A5:

    Physical assets of a network include hardware items, such as computers, switches, firewalls, routers, and other devices, that physically exist on a network.

    6:

    What is a privacy policy?

    A6:

    A privacy policy defines reasonable expectations for privacy regarding such issues as monitoring of e-mail, logging of keystrokes, and access to users' files.

    7:

    What is an acceptable-use policy?

    A7:

    An acceptable-use policy defines the boundaries of acceptable use of corporate resources (whether they be physical equipment or network services) as well as the responsibilities of the user in protecting corporate assets and equipment.

    8:

    Describe the four phases of the security wheel.

    A8:

    The four phases of the security wheel are

    1. Securing the network. Includes the deployment of systems to stop or prevent unauthorized access or activities.

    2. Monitoring the network. Involves validating the security implementation conducted in the first stage by detecting violations of the security policy.

    3. Testing the security of the network. Involves validating the effectiveness of the security policy implementation through system auditing and vulnerability scanning.

    4. Improving the security of the network. Involves using the information gathered during the monitoring and testing phases to improve the security implementation of the network.

  • / 290