CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Tebyan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید





  • Chapter 10



    A1:

    b,e

    A2:

    e

    A3:

    b

    A4:

    b

    A5:

    d,e

    A6:

    b

    A7:

    c

    A8:

    e

    A9:

    c

    A10:

    d

    A11:

    a,d

    A12:

    b,d

    Q&A

    1:

    The flow of network management traffic that follows the same path as normal data is referred to as a(n) ___-band traffic flow.

    A1:

    In

    2:

    Of the three remote-access protocols discussed in this chapter, which is the least secure and why?

    A2:

    Telnet. Data, including usernames and passwords, is sent in clear text.

    3:

    What is the primary goal of SAFE in reference to network management?

    A3:

    The secure management of all devices and hosts within a network.

    4:

    Give the reason for using tunneling protocols with management protocols.

    A4:

    The main reason for tunneling a management protocol is to secure a normally insecure protocol. An example would be the tunneling of TFTP data. Without tunneling, this data is sent in clear text and is vulnerable to various attacks.

    Additionally, the remote management of a device that is outside of your management domain benefits from the use of a tunneling protocol such as IPSec.

    5:

    Out-of-band management normally uses a(n) ________ network for management traffic.

    A5:

    Parallel

    6:

    Name two usage categories that network management protocols provide?

    A6:

    Network management protocols provide the following usage categories:

    • Remote access

    • Reporting and logging

    • Network monitoring and control

    • File management

    • Time synchronization

    7:

    A network administrator should always be aware of the level of ________ a management protocol provides.

    A7:

    Security

    8:

    What ports does SNMP use and what is the function of each port?

    A8:

    UDP 161
    Agents listen on this port

    UDP 162
    Used for trap reporting to the manager

    9:

    SSH is a secure shell program and provides protection from ___________, ___________, and _________________ attacks.

    A9:

    DNS, IP spoofing, IP source-routing

    10:

    What public-key cryptosystem does SSL use during the initial exchange or handshake process?

    A10:

    RSA

    11:

    What version of SNMP should you use if you want to ensure that SNMP traffic is encrypted?

    A11:

    SNMP version 3

    12:

    ______ management protocols should always be used in preference to ________ protocols.

    A12:

    Secure, insecure

    13:

    NTP version 3 supports cryptographic authentication between peers. Why is this useful?

    A13:

    Without this authentication, it is possible for an attacker to send bogus NTP data and, hence, affect time-sensitive services such as digital certificates, which can lead to a potential DoS.

    14:

    SSH can use what ciphers?

    A14:

    RC2, RC4, IDEA, DES, and 3DES.

    15:

    If you cannot secure management data for whatever reason, you should always be aware of the potential for what?

    A15:

    Data interception and falsification


  • / 290