CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Tebyan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید





  • "Do I Know This Already?" Quiz


    The purpose of the "Do I Know This Already?" quiz is to help you decide if you really need to read the entire chapter. If you already intend to read the entire chapter, you do not necessarily need to answer these questions now.

    The 12-question quiz, derived from the major sections in the "Foundation Topics" portion of the chapter, helps you determine how to spend your limited study time.


    1:

    The SAFE blueprint calls for the deployment of security throughout the network. What is the term used to describe this concept?

    1. Inclusive defense

    2. Defensive coverage

    3. Defense in depth

    4. Exhaustive security

    5. Total security

    2:

    What term is used to describe a network that is solely for management traffic and is separate from the main network that is carrying user traffic?

    1. Management network

    2. In-band network

    3. Secure network

    4. Out-of-band network

    5. Control network

    3:

    What is user authentication based on?

    1. The proper credentials to access a system

    2. The right to access a system

    3. The need to access a system

    4. The desire to access a system

    5. All of the above

    4:

    What does authorization ensure?

    1. That the user can communicate with the device

    2. That the user is allowed to send traffic through the device

    3. That the user can access the system

    4. That the user has sufficient privileges to execute a command or a process

    5. That the user can exit the system

    5:

    What is critical to maximizing the success of network intrusion detection?

    1. Processor speed

    2. Deployment

    3. Brand of IDS

    4. Type of IDS

    5. All of the above

    6:

    According to the security policy, which of the following does the network administrator need to implement?

    1. Suggestions

    2. Procedures

    3. Rules

    4. Axioms

    5. Guidelines

    7:

    Which of the following are considered "IDS attack mitigation"?

    1. Patches

    2. Blocking/shunning

    3. Route changes

    4. TCP resets

    5. All of the above

    8:

    Authorization allows for what kind of control in determining accountability in the network?

    1. High-level

    2. None

    3. Granular

    4. Low

    5. Defined

    9:

    What is a determined, technically competent attack against a network called?

    1. Hacking attempt

    2. Break-in

    3. Intrusion

    4. Structured threat

    5. Unstructured threat

    10:

    What is a "script kiddie" most likely considered?

    1. Structured threat

    2. Determined hacker

    3. Unstructured threat

    4. Skilled attacker

    5. None of the above

    11:

    Which of the following can be considered an internal threat?

    1. Disgruntled employee

    2. Former employee

    3. Contractor

    4. Consultant

    5. All of the above

    12:

    What is the primary focus of internal attackers?

    1. Access to the Internet

    2. Cracking into other desktop systems

    3. Privilege escalation

    4. Denial of service attacks

    5. Deleting data

    The answers to the "Do I Know This Already?" quiz are found in Appendix A, "Answers to the 'Do I Know This Already?' Quizzes and Q&A Sections." The suggested choices for your next step are as follows:

      / 290