NETWORK SECURITY AND CISCO IOS ROUTERS


  1. A reconnaissance attack is the first step toward an access attack or a denial of service (DoS) attack.

  2. General-purpose sniffers capture all-purpose packets, and are included in some operating systems.

  3. Attack sniffers are designed to capture a portion of packets, usually the first 300 “400 bytes, and are designed to capture login information such as usernames and passwords.

  4. The best type of authentication that can be used to defeat spoofing is cryptography.

  5. Application layer attacks can never be completely eliminated because vulnerabilities are continually being discovered by security professionals and by hackers.

  6. A vulnerability is a hole that exists within an operating system or application. An exploit is an attack that a hacker uses to take advantage of a vulnerability.

  7. NTP versions 3 and above support cryptographic authentication mechanisms between peers.

  8. SSH version 1 and SSH version 2 are entirely different protocols and are not compatible.

  9. IP source routing allows the sender of an IP packet to control the route that packet will take to reach the destination endpoint.

  10. You can use the TCP intercept feature to protect an internal network from TCP SYN attacks.



CCSP SECUR Exam Cram 2
CCSP SECUR Exam Cram 2 (642-501)
ISBN: B000MU86IQ
EAN: N/A
Year: 2003
Pages: 291
Authors: Raman Sud

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net