CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Tebyan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید





  • Chapter 11



    A1:

    b, d

    A2:

    b, c

    A3:

    c, e

    A4:

    e

    A5:

    c

    A6:

    c, e

    A7:

    b

    A8:

    b, c

    A9:

    a, b, d

    A10:

    b, d

    A11:

    b

    A12:

    b

    A13:

    b

    Q&A

    1:

    Define IDS.

    A1:

    IDS is a system that monitors all inbound and outbound network activity on selected segments within a network and looks for predetermined patterns or signatures of traffic flow that may indicate a network or system attack from someone attempting to break into or compromise a system.

    2:

    What protocol do Cisco Secure IDS devices use to communicate with each other?

    A2:

    Post Office Protocol

    3:

    Traditionally, what devices provided perimeter security?

    A3:

    Firewalls

    4:

    What are the three types of responses that a sensor can perform in reply to an attack?

    A4:

    TCP reset

    IP blocking or shunning

    IP logging

    5:

    What are the perimeter security features provided by a Cisco router?

    A5:

    Control of TCP/IP services

    Extensive ACL functionality

    Network Address Translation

    IPSec support

    6:

    Define a perimeter.

    A6:

    A perimeter usually exists where a private network meets a public network. It can also be found internally in a private network where sensitive data may need to be protected from unauthorized access. However, more commonly, it is just thought of as the entry point into a network for connections that are not to be trusted.

    7:

    Network sensing, attack response, and device management are functions of what device?

    A7:

    Cisco Secure IDS sensor

    8:

    Define stateful packet filtering.

    A8:

    Stateful packet filtering limits information into a network based not only on the destination and source address but also on the packet data content.

    9:

    Describe some of the features provided by CSA.

    A9:

    Host intrusion prevention

    Distributed firewall capabilities

    Malicious mobile code protection

    Operating system integrity assurance

    Audit log consolidation

  • / 290