CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Tebyan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید





  • "Do I Know This Already?" Quiz


    The purpose of the "Do I Know This Already?" quiz is to help you decide if you really need to read the entire chapter. If you already intend to read the entire chapter, you do not necessarily need to answer these questions now.

    The 10-question quiz, derived from the major sections in "Foundation Topics" portion of the chapter, helps you determine how to spend your limited study time.


    1:

    Which of the following are sources from which an attacker can determine information about a target network?

    1. DNS

    2. ARIN/RIPC/APNIC records

    3. whois information

    4. Phone book

    5. All of the above

    2:

    What does "network posture visibility reduction" mean?

    1. Lower the number of all the servers in the network

    2. Reduce the number of users that can access the network

    3. Eliminate essential services from servers in the public-facing segment to a minimum

    4. Reduce the number of services in the public-facing segment of the network to a minimum

    5. None of the above

    3:

    Which of the following actions should be taken to harden applications and thereby make it more difficult for an attacker to perform reconnaissance on a network?

    1. Remove application banners from application greetings

    2. Apply patches to all applications

    3. Turn off unnecessary services

    4. Apply access control lists to edge routers

    5. Turn off essential services

    4:

    What is the purpose of RFC 2827?

    1. It defines a range of network addresses to be used for private networks.

    2. It describes a method of mitigating DoS attacks.

    3. It describes the behavior of the TCP protocol.

    4. It defines site security procedures.

    5. It defines the behavior of the IP protocol.

    5:

    Which feature of Cisco routers is considered an "anti-DoS" feature?

    1. NetFlow

    2. Fast switching

    3. Stateful firewall

    4. TCP intercept

    5. None of the above

    6:

    Which of the following methods can you utilize to mitigate the effects of DoS attacks?

    1. NetFlow

    2. Traffic-rate limiting

    3. Fast switching

    4. Quality of service

    5. Stateful firewall

    7:

    Which of the following is classified as an unauthorized access attack?

    1. An attacker connects to a web server and downloads publicly available files

    2. An attacker connects to an anonymous FTP server and downloads publicly available files

    3. An attacker connects to the SMTP port of a mail server and forges e-mail

    4. An attacker queries DNS for information about hosts on the network

    5. An attacker connects to the Telnet port of a system and repeatedly tries various username/password combinations until he gains entry to the system

    8:

    What makes application layer attacks possible?

    1. Vulnerabilities in applications

    2. Poor access control lists

    3. Lack of proper firewall configuration

    4. Poor password choices

    5. None of the above

    9:

    How can network and system administration personnel reduce the risk of an application layer attack?

    1. They can't; application layer attacks are inevitable

    2. Follow system administration best common practices

    3. Turn off applications

    4. Block application ports at the firewall

    5. All of the above

    10:

    If an attacker is able to gain access to an internal server through a DMZ web server, what is the possible cause?

    1. The DMZ web server was not configured properly.

    2. The DMZ web server was vulnerable to exploitation.

    3. The edge router access control list was not blocking port 80.

    4. The firewall access control lists allowed for the DMZ web server to connect to the internal server.

    5. The internal server root password was weak.

    The answers to the "Do I Know This Already?" quiz are found in Appendix A, "Answers to the 'Do I Know This Already?' Quizzes and Q&A Sections." The suggested choices for your next step are as follows:


  • / 290