CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Tebyan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • Q&A


    As mentioned in the introduction, "All About the Cisco Certified Security Professional Certification," you have two choices for review questions. The questions that follow next give you a bigger challenge than the exam itself by using an open-ended question format. By reviewing now with this more difficult question format, you can exercise your memory better and prove your conceptual and factual knowledge of this chapter. The answers to these questions are found in Appendix A.

    For more practice with exam-like question formats, including questions using a router simulator and multiple choice questions, use the exam engine on the CD-ROM.

    1:

    What does a good network security policy allow?

    2:

    What does the network security policy define?

    3:

    How does a "defense-in-depth" approach work in network security?

    4:

    What is an OOB network used for in SAFE?

    5:

    What can be used in place of an OOB network?

    6:

    What is authentication?

    7:

    What is authorization?

    8:

    How does a NIDS work?

    9:

    How does a host-based IPS work?

    10:

    Why is deployment critical to the success of the IDS?

    11:

    How is SAFE able to accommodate emerging network applications?

    12:

    What are the four types of threats faced by a network?

    13:

    What are internal threats?

    14:

    What are external threats?

    15:

    What are structured threats?

    16:

    What are unstructured threats?


  • / 290