CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources]

Tebyan

نسخه متنی -صفحه : 290/ 68
نمايش فراداده

  • Foundation Summary

    The "Foundation Summary" section of each chapter lists the most important facts from the chapter. Although this section does not list every fact from the chapter that will be on the CSI exam, a well-prepared CSI candidate should at a minimum know all the details in each "Foundation Summary" section before taking the exam.

    Rudimentary network attacks include the following:

    • Reconnaissance attacks Gather information about a network in preparation for another possible attack

    • DoS attacks Render a service or a network unavailable to legitimate users

    • Unauthorized access attacks Attempts made by a person who knowingly tries to access a system for which that person does not have specific access permissions

    • Application layer attacks Exploit specific weaknesses in applications, such as web, FTP, or SMTP services, running on a host

    • Trust exploitation attacks Bypass all authentication methods on a system

    DoS attacks fall into two general categories:

    • Nondistributed denial of service These attacks are directed against a specific service such as Telnet, FTP, or some other service.

    • Distributed denial of service These attacks are aimed at a specific host or network with the aim of preventing access to the target by consuming all of the bandwidth to the target.