CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Tebyan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید





  • Chapter 9



    A1:

    d

    A2:

    a,c

    A3:

    e

    A4:

    c,e

    A5:

    a,c

    A6:

    b,d

    A7:

    b,d,e

    A8:

    b,c

    A9:

    d

    A10:

    b

    A11:

    e

    Q&A

    1:

    Describe the characteristics of a strong password.

    A1:

    Strong passwords have the following characteristics: a minimum length of at least eight characters; upper- and lowercase characters; both alphanumeric and nonalphanumeric characters such as #,@,%, and $. Ideally passwords are randomly generated.

    2:

    What is two-factor authentication?

    A2:

    A two-factor authentication system is one that requires two items of information to complete the authentication. Typically, these items are something that a person has (such as an ATM card or a token card) and something that a person knows (a PIN number or a password).

    3:

    How can cryptography mitigate packet sniffers?

    A3:

    Cryptography renders packet sniffers irrelevant. A packet sniffer that is monitoring a cryptographic channel sees data that appears to be only a random string of bits. The original message is not readable as it traverses the network.

    4:

    How can an attacker insert himself between two systems using cryptography in a man-in-the-middle attack?

    A4:

    A man-in-the-middle attack against an encrypted session can succeed only if the attacker can insert himself into the key-exchange process such that the attacker negotiates a separate session key with both parties and relays the communication sufficiently fast enough to keep up with the other two machines.

    5:

    How can Trojan-horse applications be mitigated?

    A5:

    Through the use of antivirus or host-based IPS software.

    6:

    RFC 2827 describes filtering by service providers at their edge devices. How can an enterprise network that is connecting through a service provider also benefit from RFC 2827 filtering?

    A6:

    Service provider customers can implement egress filters according to the RFC 2827 guidelines as an additional filter to prevent their networks from becoming a source of DoS attacks.

    7:

    Port redirection is effective when there is a poor or weak trust model between systems. How can an attacker use such an attack to gain access to the internal host through the DMZ web server shown earlier in Figure 9-3?

    A7:

    By identifying a vulnerability in the web server software that provides access to the server, the attacker can then access the server. Once on the server, the attacker can set up the port redirection software (such as HTTPtunnel), have the software listen on the web port of the server, and point to the other end of the tunnel at a port, such as the Telnet port, on the internal system.

    8:

    How do switched infrastructures affect packet sniffers?

    A8:

    Switches do not direct all traffic within a network segment to a switch port. Because of this, switched infrastructures present a significant hurdle to packet sniffers by reducing the amount of traffic seen by the host that is doing the sniffing. The attacker has access only to the traffic that is destined for the specific port that the compromised host connects to.

    9:

    What are two methods that antisniffer tools use to detect the possible presence of a sniffer?

    A9:

    Antisniffer tools can detect changes in the response time of hosts to determine whether the hosts are processing more traffic than their own. Other software can run on the host and detect whether the network interface has entered promiscuous mode, which is necessary to facilitate sniffing activities.

    10:

    How do password-testing tools work?

    A10:

    Password-testing programs such as LC4, Crack, and John the Ripper can take a list of known passwords and try various case changes and the addition of nonalphanumeric characters. They then encrypt these passwords and compare them against the stored hashes in the password file. If they match, then the password has been "cracked."


  • / 290