CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources]

Tebyan

نسخه متنی -صفحه : 290/ 71
نمايش فراداده

  • "Do I Know This Already?" Quiz

    The purpose of the "Do I Know This Already?" quiz is to help you decide if you really need to read the entire chapter. If you already intend to read the entire chapter, you do not necessarily need to answer these questions now.

    The 10-question quiz, derived from the major sections in the "Foundation Topics" portion of the chapter, helps you determine how to spend your limited study time.

    1:

    What is the purpose of IP spoofing attacks?

    1. To get packets past a firewall

    2. To gain access to a network resource

    3. To test router access lists

    4. To inject data into a pre-existing communication channel between two systems

    5. None of the above

    2:

    What type of IP spoofing attack occurs if the attacker is not concerned with the responses from the target system?

    1. Bidirectional

    2. Blind

    3. Tangential

    4. Source

    5. Derivational

    3:

    What type of spoofing attack occurs when the attacker controls the routing tables to redirect the response packets back to his IP address?

    1. Bidirectional

    2. Blind

    3. Tangential

    4. Source

    5. Derivational

    4:

    In what mode must a network interface work to receive all packets on the physical network wire and pass those packets up to an application?

    1. Sniffing

    2. Locked

    3. Unlocked

    4. Sensing

    5. Promiscuous

    5:

    Which of the following protocols are susceptible to passive sniffers?

    1. SNMP

    2. SSH

    3. HTTPS

    4. Telnet

    5. HTTP

    6:

    What type of attack is an attacker executing when she connects to a system and tries various account names and common default passwords?

    1. Deduction

    2. Brute-force

    3. Intuitive

    4. Driven

    7:

    For what purpose are man-in-the-middle attacks most commonly used?

    1. To capture sensitive information

    2. To hijack ongoing sessions

    3. To deny service

    4. To corrupt transmitted data

    5. All of the above

    8:

    Port redirection is a specific case of what general category of attack?

    1. IP spoofing

    2. Trust exploitation

    3. Man-in-the-middle

    4. Denial of service

    5. None of the above

    9:

    Which of the following can be used to execute a port redirection attack?

    1. httptunnel

    2. Ethereal

    3. Netcat

    4. strobe

    5. Nmap

    10:

    What is the most common means of propogating viruses and Trojan-horse applications?

    1. E-mail

    2. FTP

    3. scp

    4. The web

    5. NetBIOS shares

    The answers to the "Do I Know This Already?" quiz are found in Appendix A, "Answers to the 'Do I Know This Already?' Quizzes and Q&A Sections." The suggested choices for your next step are as follows:

  • 9 or more overall score If you want more review on these topics, skip to the "Foundation Summary" section and then go to the "Q&A" section. Otherwise, move to the next chapter.