CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Tebyan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • Q&A


    As mentioned in the introduction, "All About the Cisco Certified Security Professional Certification," you have two choices for review questions. The questions that follow next give you a bigger challenge than the exam itself by using an open-ended question format. By reviewing now with this more difficult question format, you can exercise your memory better and prove your conceptual and factual knowledge of this chapter. The answers to these questions are found in Appendix A.

    For more practice with exam-like question formats, including questions using a router simulator and multiple choice questions, use the exam engine on the CD-ROM.

    1:

    What are some of the benefits and drawbacks of ICMP scanning?

    2:

    What is the order of events of an attack on a target network?

    3:

    What are trust exploitation attacks?

    4:

    Name some DDoS attacks?

    5:

    What are buffer overflows?

    6:

    What type of attacks are buffer overflows and format string attacks?

    7:

    How does the TCP SYN flood attack work?

    8:

    What is a blind-TCP scan?

    9:

    If a TCP ACK packet is sent to a port where a service is not listening, what is the response defined in RFC 793?

    10:

    If a TCP ACK packet is sent to a port where a service is listening, what is the response defined in RFC 793?

    11:

    What are the two types of systems that are used in a DDoS attack?


  • / 290