CCSP: Securing Cisco IOS Networks Study Guide (642-501) by Todd Lammle

By Todd Lammle

Cisco is relocating aggressively into the community safeguard area by means of unveiling a lineup of a dozen new protection services and products, and a brand new professional-level certification for them, Cisco qualified safeguard specialist (CCSP). The Securing Cisco IOS Networks (SECUR) examination (#642-501) is the 1st, and most crucial, in a sequence of 5 assessments required to accomplish CCSP prestige. Sybex, the chief in Cisco certification learn publications and winner of CertCities.com 2002 Readers' selection Award for most sensible examine courses, is delivering this crucial learn consultant to the SECUR examination (#642-501). Written for everybody pursuing a occupation as a Cisco defense expert, this consultant is jam-packed with actual global eventualities and examination necessities that take you past the fundamentals and toughen key topic components. The accompanying CD contains 1000's of difficult evaluate questions, digital flashcards, and a searchable digital model of the full ebook.

Show description

Read or Download CCSP: Securing Cisco IOS Networks Study Guide (642-501) PDF

Similar network security books

The international handbook of computer security

This ebook is a one-stop source to aid executives and computing device pros guard their platforms and information from a myriad of inner and exterior threats. Addressing quite a lot of defense concerns, it presents sensible suggestions on issues comparable to: actual defense techniques * info maintenance and safeguard * and software program defense * group of workers administration and defense * community safety * contingency making plans * felony and auditing making plans and keep watch over, and extra.

Security Log Management : Identifying Patterns in the Chaos

This booklet teaches IT pros the way to study, deal with, and automate their protection log records to generate important, repeatable details that may be use to make their networks extra effective and safe utilizing essentially open resource instruments. The ebook starts by way of discussing the "Top 10" safety logs that each IT expert may be frequently reading.

LTE Security

A concise, up-to-date consultant to the 3GPP LTE safeguard Standardization necessities A welcome Revised version of the profitable LTE safety addressing the protection structure for SAE/LTE, that is in response to components of the safety architectures for GSM and 3G, yet which wanted an important redecorate as a result of the considerably elevated complexity, and varied architectural and enterprise requisites of fourth iteration platforms.

Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers

This booklet constitutes the completely refereed post-conference court cases of the twenty second overseas Workshop on quickly software program Encryption, held in Istanbul, Turkey, March 8-11, 2015. The 28 revised complete papers awarded have been conscientiously reviewed and chosen from seventy one preliminary submissions. The papers are geared up in topical sections on block cipher cryptanalysis; realizing assaults; implementation matters; extra block cipher cryptanalysis; cryptanalysis of authenticated encryption schemes; proofs; layout; light-weight; cryptanalysis of hash capabilities and move ciphers; and mass surveillance.

Additional resources for CCSP: Securing Cisco IOS Networks Study Guide (642-501)

Sample text

See Chapter 7 for more information. 27. B. Policy, technology, and configuration weaknesses are the three typical weaknesses in any network implementation. See Chapter 1 for more information. 28. B. The TCP Intercept feature implements software to protect TCP servers from TCP SYN flood attacks, which are a type of denial-of-service attack. See Chapter 4 for more information. 29. C, E. The Cisco IOS Cryptosystem consists of DES, MD5, DSS, and DH. See Chapter 7 for more information. 30. E. The ip inspect tcp max-incomplete host 100 command sets the maximum number of half-open TCP connections to a single host to 100.

DoS attacks are most often implemented using common Internet protocols such as TCP and ICMP—TCP/IP weaknesses for which, at present, Cisco has some promising and effective solutions. But, if the truth be told, there really isn’t anything around right now that you could call bulletproof to protect your network from DoS attacks. TCP attacks are executed by hackers who implement their attacks by opening more sessions than the victimized server can handle. It’s a very simple technique, but it’s also very effective because it makes that server totally inaccessible to anyone else.

Fm Page 21 Monday, May 5, 2003 12:46 PM Written Lab 21 Written Lab This section asks you 10 write-in-the-answer questions to help you understand the technology that you need to know in order to pass the SECUR exam. 1. What two common terms are used to describe eavesdropping? 2. Most network implementations have three typical security weaknesses. What are they? 3. Improper change control and no disaster recovery plan demonstrate what type of weakness? 4. An attacker tries to steal an IP address in which type of attack?

Download PDF sample

Rated 4.83 of 5 – based on 48 votes