Q&A
As mentioned in the introduction, "All About the Cisco Certified Security Professional Certification," you have two choices for review questions. The questions that follow next give you a bigger challenge than the exam itself by using an open-ended question format. By reviewing now with this more difficult question format, you can exercise your memory better and prove your conceptual and factual knowledge of this chapter. The answers to these questions are found in Appendix A.For more practice with exam-like question formats, including questions using a router simulator and multiple choice questions, use the exam engine on the CD-ROM.
1: | What are some of the benefits and drawbacks of ICMP scanning? |
2: | What is the order of events of an attack on a target network? |
3: | What are trust exploitation attacks? |
4: | Name some DDoS attacks? |
5: | What are buffer overflows? |
6: | What type of attacks are buffer overflows and format string attacks? |
7: | How does the TCP SYN flood attack work? |
8: | What is a blind-TCP scan? |
9: | If a TCP ACK packet is sent to a port where a service is not listening, what is the response defined in RFC 793? |
10: | If a TCP ACK packet is sent to a port where a service is listening, what is the response defined in RFC 793? |
11: | What are the two types of systems that are used in a DDoS attack? |