2009年3月9日星期一

CISSP Concept Study 2

26 what is a sniffer attack?

any activity that results in a malicious user obtaining information about a network or the traffic over that work

什么是嗅探器的攻击?

任何活动 其 结果是 恶意用户获取网络或以上的交通工作的信息


27 what is a spamming attack?

Directing floods of messages to a victim's email inbox or other messaging system.

Such attacks causes DOS issues b filling up storage space and preventing legitimate messages from being delivered.

什么是垃圾邮件的攻击?

邮件洪水直接导致 受害者的电子邮件收件箱或其他消息系统。

这种攻击造成的DOS 填补了大量的存储空间,并阻止了合法邮件的正常传递


28 what are some countermeasures to common attack methods?

Patching software, reconfiguring security, employing firewalls, updating filters,

using IDSs, improving security policy, using traffic filters , improving physical access control, using system monitoring/auditing

对于攻击 有什么共同的对策?

补丁软件,重组安全,雇用防火墙,更新的过滤器,

使用IDS系统,提高安全政策,使用流量过滤器,改善物理访问控制,利用系统监控/审计


29 Name the seven layers of the OSI mode by their layer name and layer number

Application 7 Presentation 6 Session 5 Transport 4, Network 3, Data Link 2, and Physical 1


30 List the security features offered by the network layer of the OSI model.

the Network layer(Layer 3 ) offers confidentiality, authentication, and integrity.


31 what is the maximum throughput rate and maximum usable distance for 10Base2 cable?

10Base2 cable has the throughput of 10Mbps and can be run up to distance of 185 meters


32 what are the three common network technologies?

Ethernet, Token Ring, and FDDI


33 Name the common network topologies.

Ring, bus, star, and mesh


34 what are the four layers of the TCP/IP protocols, and how to do they relate to the OSI model layers?

The four layers of TCP/IP are application(layers 5-7 of OSI) , Host-to-Host TCP (Layer 4 of OSI) , Internet(layer3 of Osi) and network Access(layer 1 and 2 of OSI).


35 what are the five generation types of firewalls?

static packet filtering, application-level gateway, stateful inspection, dynamic packet filtering, and kernel proxy.

什么是5代类型的防火墙?

静态包过滤,应用级网关,状态检测,动态包过滤,和内核代理。


36 name five networking device types other than firewalls

Routers, switches, hubs, repeaters, bridges, gateways, proxies


37 what is a proxy, and what is it used for?

Any system that performs a function or requests a service on behalf of another system.

Proxies are most often used to provide clients with Internet access while protecting their identity

什么是代理服务器,和它的作用是什么?

任何系统,执行一个功能或要求服务代表另一个系统。

代理是最常用是为客户提供互联网接入,同时保护他们的身份


38 Name at least 10 network and protocol security mechanism

IPSec, SKIP, SWIPE, SSL , S/MIME, SET, PEM, PGP, PPP, SLIP, PPTP, L2TP, CHAP, PAP, RADIUS, TACACS, S-RPC


39 Name at least six protocol services used to connect to LAN and WAN communication technologies.

Frame Relay, SMDS, X.25, ATM, HSSL , SDLC, HDLC, ISDN


40 How are PVC, SVC, DTE, and DCE used in a Frame Relay network?

Frame Relay requires the use of a DTE and a DCE at each connection point. PVC is always available; SVC is established using the best paths currently available.

帧中继需要使用DTE 和DCE 在每个连接点。PVC 总是可用;SVC建立最佳路径的使用现有的。


41 what are three remote access authentication mechanisms?

RADIUS, TACACS, S-RPC


42 what is tunneling, and why is it used?

A process that protects the contents of packets by encapsulating them in another protocol.

this creates the logical illusion of a communications tunnel through an untrusted intermediary network

什么是隧道,为什么它用?

一个进程依靠封装在另一种协议来保护数据包的内容 。

这造成的逻辑的一个通讯通道,通信隧道可以通过一个不被信任的中介网络



43 what is VPN?

A communication tunnel that provides point-to-point transmission of both authentication and data traffic over an intermediary network


44 what are the four primary VPN protocols?

PPTP, L2F, L2TP, and IPSec


45 what are the two modes available through IPSec, and what do they do ?

In transport mode, the IP packet data is encrypted , but the header is not, In tunnel mode, the entire IP packet is encrypted, and a new header is added to govern transmission through the tunnel.


46 what is nat?

Network address translation allows the private IP addresses defined in RFC 1918 to be used in a private network while still being able to communicate with the Internet.


47 what is transparency?

a characteristic of a service, security control, or access mechanism that ensure it is unseen by users.


48 what are some important aspects to consider when designing email security?

Nonrepudiation, access control, message integrity, source authentication, verified delivery, acceptable use policies, privacy, management, and backup and retention policies.


49 what is the most serious threat to email?

Email is the most common delivery mechanism for viruses, worms, Trojan horses, documents with destructive macros, and other malicious code.


50 what are possible mechanism for adding security to email?

S/MIME, MOSS, PEM, and PGP

没有评论:

发表评论