Task 2 talks about comparing the network security policy with the current firewall policy and rulesets. I'm not entirely sure what this is - perhaps the author means verifying the firewall implementation against the firewall policy documentation?
Task 3 - a "massive attack"? Task 4 - "Use tool such as Tripwire" - surely this should be covered in the host integrity verification or hardware IDS topic? Task 5 - "Limit or ignore the response to a recived packet". Again, I'm not sure what this is? Best, --- Les Bell, RHCE, CISSP [http://www.lesbell.com.au] _______________________________________________ lpi-examdev mailing list [EMAIL PROTECTED] http://list.lpi.org/mailman/listinfo/lpi-examdev
