CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Tebyan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • Foundation Summary


    The "Foundation Summary" section of each chapter lists the most important facts from the chapter. Although this section does not list every fact from the chapter that will be on the CSI exam, a well-prepared CSI candidate should at a minimum know all the details in each "Foundation Summary" section before taking the exam.

    Rudimentary network attacks include the following:

    • Reconnaissance attacks
      Gather information about a network in preparation for another possible attack

    • DoS attacks
      Render a service or a network unavailable to legitimate users

    • Unauthorized access attacks
      Attempts made by a person who knowingly tries to access a system for which that person does not have specific access permissions

    • Application layer attacks
      Exploit specific weaknesses in applications, such as web, FTP, or SMTP services, running on a host

    • Trust exploitation attacks
      Bypass all authentication methods on a system


    DoS attacks fall into two general categories:

    • Nondistributed denial of service
      These attacks are directed against a specific service such as Telnet, FTP, or some other service.

    • Distributed denial of service
      These attacks are aimed at a specific host or network with the aim of preventing access to the target by consuming all of the bandwidth to the target.



  • / 290