Task 2 talks about comparing the network security policy with the current
firewall policy and rulesets. I'm not entirely sure what this is - perhaps
the author means verifying the firewall implementation against the firewall
policy documentation?

Task 3 - a "massive attack"?

Task 4 - "Use tool such as Tripwire" - surely this should be covered in the
host integrity verification or hardware IDS topic?

Task 5 - "Limit or ignore the response to a recived packet". Again, I'm not
sure what this is?

Best,

--- Les Bell, RHCE, CISSP
[http://www.lesbell.com.au]


_______________________________________________
lpi-examdev mailing list
[EMAIL PROTECTED]
http://list.lpi.org/mailman/listinfo/lpi-examdev

Reply via email to