Sei sulla pagina 1di 6

CCNA Security Chapter 1

Modern Network Security Threats

1.0.1 What does Network Security involve?

What do Network security organizations do?

What are some types of network attacks?

1.1.1 Why is Network Security important to


organizations and businesses?

What is the difference between an intrusion


detection system (IDS) and an intrusion
prevention system (IPS)?

Explain the difference between packet-filtering


firewalls and stateful firewalls?

What are the two main types of internal threats


to the network?

Page 1 of 6
CCNA Security Chapter 1
Modern Network Security Threats

What is Cryptography?

Describe the three components of Information


Security?

1.1.2 What is a hacker? Bad or Good

Describe Nmap

Describe SATAN

Describe Back Orifice 2000

Page 2 of 6
CCNA Security Chapter 1
Modern Network Security Threats

What is the main need for laws safeguarding


network security?

1.1.3 What are some of the network security


organizations?

1.1.4 What are the 12 network security domains


specified by the ISO/IEC?

1,1,5 What is a Security Policy?

Describe the Cisco Self-Defending Network.

Page 3 of 6
CCNA Security Chapter 1
Modern Network Security Threats

1.2.1 Describe the three primary vulnerabilities for


end-users:

1.2.2 Describe the three major components to most


worm attacks:

Describe the five basic phases of a worm or


virus attack:

1.2.3 Describe the types of Trojan Horse attacks:

1.2.4 Describe the four phases of worm mitigation:

Describe Cisco Security Agent:

Page 4 of 6
CCNA Security Chapter 1
Modern Network Security Threats

Describe the Cisco Network Admission Control


(NAC):

Describe Cisco MARS

1.3.1 Describe the three major categories of network


attacks:

1.3.3 Describe the five basic ways that DoS attacks


can do harm:

1.3.4 How can Reconnaissance attacks be


mitigated?

Page 5 of 6
CCNA Security Chapter 1
Modern Network Security Threats

How can Access attacks be mitigated?

How can DoS or DDoS attacks be mitigated?

Describe the 10 best practices to secure your


network:

Page 6 of 6

Potrebbero piacerti anche