By Todd Lammle

Cisco is relocating aggressively into the community safeguard area by means of unveiling a lineup of a dozen new safety services, and a brand new professional-level certification for them, Cisco qualified safety specialist (CCSP). The Securing Cisco IOS Networks (SECUR) examination (#642-501) is the 1st, and most important, in a sequence of 5 tests required to accomplish CCSP prestige. Sybex, the chief in Cisco certification learn publications and winner of CertCities.com 2002 Readers' selection Award for top research publications, is supplying this crucial research consultant to the SECUR examination (#642-501). Written for everybody pursuing a profession as a Cisco safeguard specialist, this consultant is choked with actual international situations and examination necessities that take you past the fundamentals and toughen key topic components. The accompanying CD contains hundreds and hundreds of demanding assessment questions, digital flashcards, and a searchable digital model of the full publication.

Show description

Read Online or Download CCSP: securing Cisco IOS networks study guide PDF

Similar network security books

Network+ Guide to Networks, 5th Edition

Understanding tips on how to set up, configure, and troubleshoot a working laptop or computer community is a hugely marketable and interesting ability. This e-book first introduces the basic construction blocks that shape a contemporary community, equivalent to protocols, topologies, undefined, and community working platforms. It then presents in-depth insurance of an important ideas in modern networking, comparable to TCP/IP, Ethernet, instant transmission, and protection.

Reverse Deception: Organized Cyber Threat Counter-Exploitation

In-depth counterintelligence strategies to struggle cyber-espionage "A entire and exceptional evaluate of the subject via specialists within the box. "--Slashdot divulge, pursue, and prosecute the perpetrators of complex chronic threats (APTs) utilizing the validated safety strategies and real-world case reports featured during this one of a kind advisor.

Physical-Layer Security for Cooperative Relay Networks

This booklet provides physical-layer defense as a promising paradigm for reaching the information-theoretic secrecy required for instant networks. It explains how instant networks are super liable to eavesdropping assaults and discusses a number safety suggestions together with information-theoretic defense, synthetic noise aided safeguard, security-oriented beamforming, and variety assisted defense techniques.

Walling Out the Insiders. Controlling Access to Improve Organizational Security

Insider threats are far and wide. to deal with them in an affordable demeanour that doesn't disrupt the complete association or create an environment of paranoia calls for commitment and a spotlight over a long term. agencies can turn into a safer, yet to stick that manner it will be significant to improve a company tradition the place protection matters are inherent in all features of association improvement and administration.

Additional resources for CCSP: securing Cisco IOS networks study guide

Example text

Configuration weakness E. Software weakness 3. Which of the following are examples of TCP/IP weaknesses? ) A. Trojan horse B. HTML attack C. Session replaying D. Application-layer attack E. SNMP F. SMTP 4. Which Cisco IOS feature would you use to protect a TCP server from TCP SYN-flooding attacks? A. Rerouting B. TCP Intercept C. Access control lists D. , 1151 Marina Village Parkway, Alameda, CA 94501. fm Page 23 Monday, May 5, 2003 12:46 PM Review Questions 5. 23 Which of the following can be used to counter an unauthorized access attempt?

You made it through the introduction to network security! Great—so now that you understand all the problems associated with equipment, networks, and people, what do you do with all this information? The first step is to begin protecting your corporate network by creating and deploying a security policy that includes each and every way that you and everyone else in the company is going to guard your oh-so-sensitive data! RFC 2196 states that a security policy is a formal statement of the rules by which people who are given access to an organization’s technology and information assets must abide.

The Cisco IOS offers you some protection with features such as Lock-and-Key, a Terminal Access Controller Access Control System (TACACS+) server, a remote authentication server, and Challenge Handshake Authentication Protocol (CHAP), an authentication protocol. These features provide additional security against unauthorized access attempts. In addition to a TACACS+ server and CHAP, you can provide a mechanism that authenticates a user beyond an IP network address. It supports features such as password token cards and creates other challenges to gaining access to network resources.

Download PDF sample

Download CCSP: securing Cisco IOS networks study guide by Todd Lammle PDF
Rated 4.43 of 5 – based on 19 votes