CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Tebyan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید





  • "Do I Know This Already?" Quiz


    The purpose of the "Do I Know This Already?" quiz is to help you decide if you really need to read the entire chapter. If you already intend to read the entire chapter, you do not necessarily need to answer these questions now.

    The 10-question quiz, derived from the major sections in the "Foundation Topics" portion of the chapter, helps you determine how to spend your limited study time.


    1:

    Ping is a reliable ICMP echo scan. What is another reliable type of scan that can be used to enumerate hosts on a target network?

    1. ICMP echo-reply scan

    2. ICMP traceroute scan

    3. Blind TCP scan

    4. UDP ping

    5. ICMP timestamp scan

    2:

    What TCP bit must be set to allow packets to pass through a router's access control list?

    1. PSH

    2. URG

    3. DMP

    4. SYN

    5. ACK

    3:

    Which of the following are examples of DDoS attack tools?

    1. SQL Slammer

    2. stacheldracht

    3. trin00

    4. slapper

    5. Li0n

    4:

    DDoS attacks are based on a two-tier model of systems. What are the two types of systems involved in a DDoS attack called?

    1. Client and server

    2. Target and attacker

    3. Zombie and client

    4. Handler and agent

    5. Master and target

    5:

    Unauthorized access attacks can be conducted over what applications?

    1. Telnet

    2. SSH

    3. FTP

    4. HTTPS

    5. All of the above

    6:

    What does an attacker gain by using application layer attacks?

    1. The ability to perform a denial of service

    2. Reconnaissance

    3. Access to a host

    4. Target enumeration

    7:

    Which of the following are application layer attacks?

    1. IIS directory traversal

    2. Ping of death

    3. ICMP flood

    4. land.c

    5. Solaris snmpXdmid buffer overflow

    8:

    Which of the following attacks is related to a buffer overflow?

    1. Buffer underflow

    2. Miss-by-one attack

    3. Format string attack

    4. Fast Data MMU Miss attack

    5. None of the above

    9:

    Which services on UNIX hosts do trust exploitation attacks typically involve?

    1. Telnet

    2. FTP

    3. RSH

    4. R-login

    5. None of the above

    10:

    How do trust exploitation attacks work?

    1. By bypassing all authentication methods on a system

    2. By providing the attacker with a trust token that can be used to gain access to any host on the network

    3. By exploiting the file systems exported by a server

    4. None of the above

    The answers to the "Do I Know This Already?" quiz are found in Appendix A, "Answers to the 'Do I Know This Already?' Quizzes and Q&A Sections." The suggested choices for your next step are as follows:


  • / 290