2 cissp ® Official Study Guide Eighth Edition


Know the OSI model layers and which protocols are found in each



Download 19,3 Mb.
Pdf ko'rish
bet482/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   478   479   480   481   482   483   484   485   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Know the OSI model layers and which protocols are found in each.
The seven layers and 
the protocols supported by each of the layers of the OSI model are as follows:
Application: HTTP, FTP, LPD, SMTP, Telnet, TFTP, EDI, POP3, IMAP, SNMP, 
NNTP, S-RPC, and SET
Presentation: Encryption protocols and format types, such as ASCII, EBCDICM, TIFF, 
JPEG, MPEG, and MIDI
Session: NFS, SQL, and RPC
Transport: SPX, SSL, TLS, TCP, and UDP
Network: ICMP, RIP, OSPF, BGP, IGMP, IP, IPSec, IPX, NAT, and SKIP
Data Link: SLIP, PPP, ARP, L2F, L2TP, PPTP, FDDI, ISDN
Physical: EIA/TIA-232, EIA/TIA-449, X.21, HSSI, SONET, V.24, and V.35
Have a thorough knowledge of TCP/IP.
Know the difference between TCP and UDP; be 
familiar with the four TCP/IP layers (Application, Transport, Internet, and Link) and how 
they correspond to the OSI model. In addition, understand the usage of the well-known 
ports and be familiar with the subprotocols.
Know the different cabling types and their lengths and maximum throughput rates.
This includes STP, 10BaseT (UTP), 10Base2 (thinnet), 10Base5 (thicknet), 100BaseT, 
1000BaseT, and fiber-optic. You should also be familiar with UTP categories 1 through 7.
Be familiar with the common LAN technologies.
The most common LAN technology 
is Ethernet. Also be familiar with analog versus digital communications; synchronous vs. 
asynchronous communications; baseband vs. broadband communications; broadcast, mul-
ticast, and unicast communications; CSMA, CSMA/CA, and CSMA/CD; token passing; 
and polling.
Understand secure network architecture and design.
Network security should take into 
account IP and non-IP protocols, network access control, using security services and 
devices, managing multilayer protocols, and implementing endpoint security.
Understand the various types and purposes of network segmentation.
Network segmenta-
tion can be used to manage traffic, improve performance, and enforce security. Examples of 
network segments or subnetworks include intranet, extranet, and DMZ.


Exam Essentials 

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   478   479   480   481   482   483   484   485   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish