2 cissp ® Official Study Guide Eighth Edition


Know the network reconnaissance techniques used by attackers preparing to attack a



Download 19,3 Mb.
Pdf ko'rish
bet878/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   873   874   875   876   877   878   879   880   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Know the network reconnaissance techniques used by attackers preparing to attack a 
network.
Before launching an attack, attackers use IP sweeps to search out active hosts 
on a network. These hosts are then subjected to port scans and other vulnerability probes 
to locate weak spots that might be attacked in an attempt to compromise the network. You 
should understand these attacks to help protect your network against them, limiting the 
amount of information attackers may glean.
Written Lab
1.
What is the major difference between a virus and a worm?
2.
Explain how an attacker might construct a rainbow table.
3.
What are the actions an antivirus software package might take when it discovers an 
infected file?
4.
Explain how a data integrity assurance package like Tripwire provides some secondary 
virus detection capabilities.


Review Questions 
945
Review Questions
1.
What is the most commonly used technique to protect against virus attacks?
A.
Signature detection
B.
Heuristic detection
C.
Data integrity assurance
D.
Automated reconstruction
2.
You are the security administrator for an e-commerce company and are placing a new web 
server into production. What network zone should you use?
A.
Internet
B.
DMZ
C.
Intranet
D.
Sandbox
3.
Which one of the following types of attacks relies on the difference between the timing of 
two events?
A.
Smurf
B.
TOCTOU
C.
Land
D.
Fraggle
4.
Which one of the following techniques is most closely associated with APT attacks?

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   873   874   875   876   877   878   879   880   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish