CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide, Second Edition [Electronic resources]

Greg Bastien; Earl Carter; Christian Degu

نسخه متنی -صفحه : 191/ 145
نمايش فراداده

  • Chapter 1

    "Do I Know This Already?" Quiz

    A1:

    Answer: e

    A2:

    Answer: b, c, e

    A3:

    Answer: a

    A4:

    Answer: c

    A5:

    Answer: d

    A6:

    Answer: b

    A7:

    Answer: e

    A8:

    Answer: c

    A9:

    Answer: False

    A10:

    Answer: b

    Q&A

    A1:

    Answer: The network security process is an ongoing process that ensures the constant improvement of security in accordance with the security policy.

    A2:

    Answer: The attacker first gains information about the network by launching a reconnaissance attack against specific targets and then attempts to exploit vulnerabilities discovered during the reconnaissance.

    A3:

    Answer: Replies from ICMP requests will tell you which addresses on the network are assigned to running systems.

    A4:

    Answer: There is no single most important component. Defense in depth is a combination of products, processes, and architecture used to identify and mitigate attacks.

    A5:

    Answer: Organizations are expected to exercise "reasonable care" to secure their networks and resources.