2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet415/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   411   412   413   414   415   416   417   418   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

A.
Piggybacking
B.
Espionage
C.
Masquerading
D.
Abuse
15.
What is the most important goal of all security solutions?
A.
Prevention of disclosure
B.
Maintaining integrity
C.
Human safety
D.
Sustaining availability
16.
What is the ideal humidity range for a computer room?
A.
20–40 percent
B.
40–60 percent
C.
60–75 percent
D.
80–95 percent
17.
At what voltage level can static electricity cause destruction of data stored on hard drives?
A.
4,000
B.
17,000
C.
40
D.
1,500
18.
A Type B fire extinguisher may use all 
except
which of the following suppression mediums?
A.
Water
B.
CO
2
C.
Halon or an acceptable halon substitute
D.
Soda acid


438
Chapter 10 

Physical Security Requirements
19.
What is the best type of water-based fire suppression system for a computer facility?
A.
Wet pipe system
B.
Dry pipe system
C.
Preaction system
D.
Deluge system
20.
Which of the following is typically 
not
a culprit in causing damage to computer equipment 
in the event of a fire and a triggered suppression?
A.
Heat
B.
Suppression medium
C.
Smoke
D.
Light


Secure Network 
Architecture and 
Securing Network 
Components
The CISSP exAm ToPICS Covered IN 
ThIS ChAPTer INClude:

Domain 4: Communication and Network Security

4.1 Implement secure design principles in network 
architectures

4.1.1 Open System Interconnection (OSI) and Transmis-
sion Control Protocol/Internet Protocol (TCP/IP) models

4.1.2 Internet Protocol (IP) networking

4.1.3 Implications of multilayer protocols

4.1.4 Converged protocols

4.1.5 Software-defined networks

4.1.6 Wireless networks

4.2 Secure network components

4.2.1 Operation of hardware

4.2.2 Transmission media

4.2.3 Network Access Control (NAC) devices

4.2.4 Endpoint security

4.2.5 Content-distribution networks
Chapter 
11


Computers and networks emerge from the integration of 
communication devices, storage devices, processing devices, 
security devices, input devices, output devices, operating 
systems, software, services, data, and people. This chapter discusses the Open Systems 
Interconnection (OSI) model as a guiding principle in networking, cabling, wireless con-
nectivity, Transmission Control Protocol/Internet Protocol (TCP/IP) and related protocols
networking devices, and firewalls.
The Communication and Network Security domain for the CISSP certification exam 
deals with topics related to network components (i.e., network devices and protocols), spe-
cifically, how they function and how they are relevant to security. This domain is discussed 
in this chapter and in Chapter 12, “Secure Communications and Network Attacks.” Be 
sure to read and study the materials in both chapters to ensure complete coverage of the 
essential material for the CISSP certification exam.
OSI Model
Communications between computers over networks are made possible by protocols. A
protocol
is a set of rules and restrictions that define how data is transmitted over a network 
medium (e.g., twisted-pair cable, wireless transmission). In the early days of network devel-
opment, many companies had their own proprietary protocols, which meant interaction 
between computers of different vendors was often difficult, if not impossible. In an effort 
to eliminate this problem, the 
International Organization for Standardization (ISO)
devel-
oped the
 Open Systems Interconnection (OSI) Reference Model
for protocols in the early 
1980s. Specifically, ISO 7498 defines the OSI Reference Model (more commonly called the 
OSI model). Understanding the OSI model and how it relates to network design, deploy-
ment, and security is essential in preparing for the CISSP exam.
In order to properly implement secure design principles in network architectures, it is 
important to fully understand all of the technologies involved in computer communica-
tions. From hardware and software to protocols and encryption and beyond, there are lots 
of details to know, standards to understand, and procedures to follow. Additionally, the 
basis of secure network architecture and design is a thorough knowledge of the OSI and 
TCP/IP models as well as Internet Protocol (IP) networking in general.


OSI Model 

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   411   412   413   414   415   416   417   418   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish