CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Tebyan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید





  • "Do I Know This Already?" Quiz


    The purpose of the "Do I Know This Already?" quiz is to help you decide if you really need to read the entire chapter. If you already intend to read the entire chapter, you do not necessarily need to answer these questions now.

    The 11-question quiz, derived from the major sections in the "Foundation Topics" portion of the chapter, helps you determine how to spend your limited study time.


    1:

    What RFC discusses suggested service provider filtering that restricts the traffic originating from an edge network to the IP address range assigned to that network?

    1. 1918

    2. 1745

    3. 973

    4. 2827

    5. 2828

    2:

    What two methods are most effective in mitigating IP spoofing attacks?

    1. Access control

    2. Use of RFC 1918 addresses

    3. RFC 2827 filtering

    4. Strong authentication

    5. Cryptography

    3:

    What type of trust model facilitates IP spoofing attacks?

    1. Strong

    2. Open

    3. User-based

    4. Closed

    5. IP addressbased

    4:

    Which of the following is a two-factor based authentication method?

    1. Passwords

    2. Cryptography

    3. One-time passwords

    4. IPSec

    5. Bank ATM

    5:

    Antisniffer software works by what two methods?

    1. It detects changes in the response time of hosts to determine if the hosts are processing more traffic than their own.

    2. It identifies sniffing software running on a host.

    3. It can identify when a network interface goes into promiscuous mode.

    4. It can remotely see promiscuous packets that are captured by a host that is sniffing.

    5. There is no such thing as "antisniffer" software.

    6:

    Why is cryptography an effective mitigation tool against sniffing?

    1. Cryptography is not an effective mitigation tool against sniffing.

    2. The attacker only sees data that appears to be a random string of bits.

    3. The key exchange masks the data being transmitted across the wire.

    4. An attacker cannot decode encrypted data without knowing the session key.

    5. Sniffing software cannot sniff encrypted packets.

    7:

    Good passwords are characterized by which of the following?

    1. They have a minimum length of five characters.

    2. They have a combination of alphanumeric and nonalphanumeric characters.

    3. They are easy to remember.

    4. They are random.

    5. They have a minimum length of eight characters.

    8:

    Which of the following are good password-testing tools?

    1. Ethereal

    2. John the Ripper

    3. LC4

    4. dsniff

    5. NetBIOS Audit Tool

    9:

    Man-in-the-middle attacks can be effectively mitigated through which of the following techniques?

    1. Access control lists

    2. Strong authentication

    3. Patches

    4. Use of cryptography

    5. Firewalls

    10:

    How are port redirection attacks successful?

    1. They rely on strong trust models between systems to allow a port on one host to connect to a port on another host.

    2. They rely on weak trust models between systems to allow a port on one host to connect to a port on another host.

    3. Port redirection attacks are not possible.

    4. They rely on poor authentication across hosts.

    11:

    What is a key method of preventing virus and Trojan-horse applications from entering a network?

    1. Firewalls

    2. Router access lists

    3. Patches

    4. Intrusion detection

    5. Antivirus software

    The answers to the "Do I Know This Already?" quiz are found in Appendix A, "Answers to the 'Do I Know This Already?' Quizzes and Q&A Sections." The suggested choices for your next step are as follows:

      / 290