2 cissp ® Official Study Guide Eighth Edition


Which of the following is  not a technology specifically associated with 802.11 wireless networking? A



Download 19,3 Mb.
Pdf ko'rish
bet488/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   484   485   486   487   488   489   490   491   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

16.
Which of the following is 
not
a technology specifically associated with 802.11 wireless
networking?
A.
WAP
B.
WPA
C.
WEP
D.
802.11i
17.
Which wireless frequency access method offers the greatest throughput with the least
interference?
A.
FHSS
B.
DSSS
C.
OFDM
D.
OSPF
18.
What security concept encourages administrators to install firewalls, malware scanners, 
and an IDS on every host?
A.
Endpoint security
B.
Network access control (NAC)
C.
VLAN
D.
RADIUS


520
Chapter 11 

Secure Network Architecture and Securing Network Components
19.
What function does ARP perform?
A.
It is a routing protocol.
B.
It resolves IP addresses into MAC addresses.
C.
It resolves physical addresses into logical addresses.
D.
It manages multiplex streaming.
20.
What form of infrastructure mode wireless networking deployment supports large physical 
environments through the use of a single SSID but numerous access points?
A.
Stand-alone
B.
Wired extension
C.
Enterprise extension
D.
Bridge


Chapter 
12
Secure 
Communications 
and Network Attacks
The CISSP exAm ToPICS Covered IN 
ThIS ChAPTer INClude:

Domain 4: Communication and Network Security

4.3 Implement secure communication channels according
to design

4.3.1 Voice

4.3.2 Multimedia collaboration

4.3.3 Remote access

4.3.4 Data communications

4.3.5 Virtualized networks


Data residing in a static form on a storage device is fairly 
simple to secure. As long as physical access control is main-
tained and reasonable logical access controls are implemented, 
stored files remain confidential, retain their integrity, and are available to authorized users. 
However, once data is used by an application or transferred over a network connection, the 
process of securing it becomes much more difficult.
Communications security covers a wide range of issues related to the transportation 
of electronic information from one place to another. That transportation may be between 
systems on opposite sides of the planet or between systems on the same business network. 
Once it is involved in any means of transportation, data becomes vulnerable to a plethora 
of threats to its confidentiality, integrity, and availability. Fortunately, many of these 
threats can be reduced or eliminated with the appropriate countermeasures.
Communications security is designed to detect, prevent, and even correct data transportation 
errors (that is, it provides integrity protection as well as confidentiality). This is done to sustain 
the security of networks while supporting the need to exchange and share data. This chapter 
covers the many forms of communications security, vulnerabilities, and countermeasures.
The Communication and Network Security domain for the CISSP certification exam 
deals with topics related to network components (i.e., network devices and protocols),
specifically how they function and how they are relevant to security. This domain is
discussed in this chapter and in Chapter 11, “Secure Network Architecture and Securing 
Network Components.” Be sure to read and study the material in both chapters to ensure 
complete coverage of the essential material for the CISSP certification exam.
Network and Protocol Security 
Mechanisms
Transmission Control Protocol/Internet Protocol (TCP/IP)
is the primary protocol suite 
used on most networks and on the internet. It is a robust protocol suite, but it has numer-
ous security deficiencies. In an effort to improve the security of TCP/IP, many subprotocols, 
mechanisms, or applications have been developed to protect the confidentiality, integrity, and 
availability of transmitted data. It is important to remember that even with the foundational 
protocol suite of TCP/IP, there are literally hundreds, if not thousands, of individual pro-
tocols, mechanisms, and applications in use across the internet. Some of them are designed 
to provide security services. Some protect integrity, others protect confidentiality, and others 
provide authentication and access control. In the next sections, we’ll discuss some of the more 
common network and protocol security mechanisms.


Network and Protocol Security Mechanisms 

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   484   485   486   487   488   489   490   491   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish