Q&A
As mentioned in the introduction, "All About the Cisco Certified Security Professional Certification," you have two choices for review questions. The questions that follow next give you a bigger challenge than the exam itself by using an open-ended question format. By reviewing now with this more difficult question format, you can exercise your memory better and prove your conceptual and factual knowledge of this chapter. The answers to these questions are found in Appendix A.For more practice with exam-like question formats, including questions using a router simulator and multiple choice questions, use the exam engine on the CD-ROM.
1: | What is an IP spoofing attack? |
2: | How can an attacker receive packets if he is spoofing the IP address of his system to attack the target? |
3: | How do packet sniffers work? |
4: | What kind of information can packet sniffers capture? |
5: | What is a brute-force password attack? |
6: | Once attackers have cracked an account through password attacks, what can they do? |
7: | What is a man-in-the-middle attack? |
8: | What is a port redirection attack? |
9: | What are two software packages that an attacker can use to execute a port redirection attack? |
10: | What is a virus? |
11: | What is a Trojan-horse application? |