... technical editor for Security+ StudyGuide
and DVD Training System, (ISBN: 978-1-931836-72-2, Syngress), lead
author and technical editor for Network+ StudyGuide & Practice Exams:
Exam ... Cheat at
Securing Linux (ISBN: 1597492078), How to Cheat at Administering Office
Communications Server 2007 (ISBN: 1597492126), Microsoft Forefront
Security Administration Guide (ISBN: 1597492447), ...
analysis. Robert also has many years of diverse experience deploying and
engineering mainframes and Linux- and Unix-based systems such as Red
Hat and Sun Solaris. Robert has in-depth work-related...
... unless it is a particularly long segment.
Repair of fiber-optic cabling is difficult and requires professional training.
If there is a bad section that has to be replaced, connecting a new section...
... sniffers that can be used in a site survey include the
Windows-based NetStumbler and the UNIX /Linux- based Kismet or
ethereal.
235
CHAPTER 6
EXAM OBJECTIVES IN THIS CHAPTER
THE OSI MODEL 237
THE...
... subnetting. Work through the
examples in this chapter and make up some of your
own. If you have a study buddy, you can help each
other by testing your knowledge of this crucial topic.
Tables 7.17,...
... The best tools to check connectivity at the network
layer are ping, tracert, traceroute (fr UNIX /Linux) , and pathping (for Windows
2000/2003), which we discussed in Chapter 11.
You should also ... utilities that have been discussed in
Chapter 11, as well as the traceroute utility for UNIX and Linux computers.
Computers and routers using IP can report errors and exchange control and
status ...
address data packets from the sending to the receiving computer.
As you’ve worked through this guide, you’ve learned that routing takes
place at the network layer, and routing is all about recognizing...
... single client in your environment. Windows NT,
2000, 2003, and UNIX /Linux servers can act as a DHCP server;
all Windows and UNIX /Linux can act as clients. You can use the
ipconfig /release and ipconfig ... connectivity problems. At the network layer, you
used ping and tracert (or traceroute for a UNIX /Linux computer) to determine
if network packets were being properly routed from one host to another. ... and Telnet client software, while
Windows client operating systems such as Windows 2000 and XP
Professional only include the Telnet client. Telnet differs from FTP
in that you cannot transfer...
...
use, but that can be valuable if previous standards need to be reviewed.
As is the case with the Institute of Electrical and Electronics Engineers
(IEEE) standards, the number of standards published ... organization that consists of vendors, network admin-
istrators, designers, researchers, and other professionals who are interested
in the operation and future of the Internet. These people can...
... starts and ends.
You have an environment that has many Linux- based machines on 9.
it. Which of the following tasks can be performed on your Linux-
based machines with the ifconfig command? Choose ... commands is a Linux- based command used 1.
to troubleshoot DNS?
A. DNSLookup
B. Nslookup
C. Dig
D. Query
Correct answers and explanations: C. Answer C is correct, because Dig is
a Linux- based ... closer to determining the
cause of the issue on the server. Answer C is incorrect because dig is a Linux-
based command, and you are using a Windows XP machine to perform your
troubleshooting. Answer...
... Agency
Network (ARPANet), 9, 258,
346
AIEE. See American Institute of
Electrical Engineers
AirSnort, 209, 213–215
Altair 8800, 10
American Institute of Electrical
Engineers (AIEE), 639
Analog...
...
Security Professional
Study Guide
3rd Edition
4443.book Page i Sunday, July 10, 2005 12:49 PM
Introduction
The
CISSP: Certified Information Systems Security ProfessionalStudy Guide, 3rd ... CISSP exam…My sole source of exam related
study was this book.
—Amazon.com reader
Praise for CISSP: Certified Information Systems
Security ProfessionalStudyGuide from Sybex
4443_IFC.qxd 7/11/05 ... certification exam.
If your goal is to become a certified security professional, then the CISSP certification and this study
guide are for you. The purpose of this book is to adequately prepare...
... INCIDENTAL,
CONSEQUENTIAL, OR OTHER DAMAGES.
Linux ProfessionalInstitute and the LPI logo are trademarks of LinuxProfessional Institute, Inc. The Linux
ProfessionalInstitute does not endorse any third ... to the LPIC 1 Certification Bible. This book is designed to help you
prepare for the LinuxProfessionalInstituteCertification Level 1 exams 101
and 102. The LinuxProfessionalInstitute is a ... II: Getting Around in Linux
Part II covers the basics of using Linux. This part explains many of the text process-
ing tools available for Linux. Information on working with Linux partitions and...
...
San Francisco • London
CISSP
®
:
Certified Information
Systems Security Professional
Study Guide
2nd Edition
Ed Tittel
James Michael Stewart
Mike Chapple
4335cFM.fm Page iii Wednesday, ... Security ProfessionalStudy Guide
you hold in your hands is com-
prehensive, in-depth, and pedagogically sound. We’re confident that this book will exceed the
demanding standards of the certification ...
Review the (ISC)
2
’s studyguide from
www.isc2.org
.
Use the flashcards found on the CD to reinforce your understanding of concepts.
Completing the Certification Process
Once...
...
communication partner system.
The OSI model is an open network architecture guide for network product vendors. This
standard, or guide, provides a common foundation for the development of new protocols, ... packets based on speed, hops, preference, and so on.
Routers use the destination IP address to guide the transmission of packets.
Transport Layer
The
Transport layer (layer 4)
is responsible...