Ads 468x60px

CCNA Security Chapter 9 Exam

CCNA Security Chapter 9  Exam

 

CCNA Security Chapter 9  Exam

 

1. In which phase of the system development life cycle should security requirements be addressed?
Add security requirements during the initiation phase.
>> 
Include a minimum set of security requirements at each phase.
Apply critical security requirements during the implementation phase.
Implement the majority of the security requirements at the acquisition phase.
2. Which type of analysis uses a mathematical model that assigns a monetary figure to the value of assets, the cost of threats being realized, and the cost of security implementations?
Qualitative Risk Analysis
>> 
Quantitative Risk Analysis
Qualitative Asset Analysis
Quantitative Continuity Analysis

3. Which term describes a completely redundant backup facility, with almost identical equipment to the operational facility, that is maintained in the event of a disaster?
backup site
cold site
>> 
hot site
reserve site
4. Which network security test requires a network administrator to launch an attack within the network?
network scan
password crack
>> 
penetration test
vulnerability scan
5. Which three documents comprise the hierarchical structure of a comprehensive security policy for an organization? (Choose three.)
backup policy
server policy
incident policy
>> 
governing policy
>> 
end-user policy
>> 
technical policy
6. Which three detailed documents are used by security staff for an organization to implement the security policies? (Choose three.)
asset inventory
best practices
>> 
guidelines
>> 
procedures
risk assessment
>> 
standards
7. What are the two major components of a security awareness program? (Choose two.)
>> 
awareness campaign
security policy development
security solution development
self-defending network implementation
>> 
training and education
8. When an organization implements the two-person control principle, how are tasks handled?
>> 
A task requires two individuals who review and approve the work of each other.
A task is broken down into two parts, and each part is assigned to a different individual.
A task must be completed twice by two operators who must achieve the same results.
A task is rotated among individuals within a team, each completing the entire task for a specific amount of time.
9. Which component of the security policy lists specific websites, newsgroups, or bandwidth-intensive applications that are not allowed on the company network?
remote access policies
>> 
acceptable use policies
incident handling procedures
identification and authentication policies
10. Which security document includes implementation details, usually with step-by-step instructions and graphics?
guideline document
standard document
>> 
procedure document
overview document
11. Which option describes ethics?
>> 
Ethics is a standard that is higher than the law.
Ethics involves government agencies enforcing regulations.
Ethics compliance is the basis for setting security policies.
Ethics deals with criminal law and monetary compensation.
12. In the Cisco SecureX architecture, which component is considered the workhorse of policy enforcement?
next-generation endpoint
policy management console
>> 
scanning engine
Security Intelligence Operations
13. Which development has contributed most to the growing demand for a borderless network?
>> 
consumer endpoints
DMZ services
corporate managed laptops
personal firewall software
14. Which aspect of a scanning element is able to determine a security policy to apply based on information such as the person using the device, the location of the device, and the application being used?
>> 
context awareness
perimeter awareness
centralized enforcement
perimeter deployment
15. A company is considering implementing the Cisco SecureX security architecture. What is the purpose of Cisco TrustSec?
>> 
It is a technology that implements packet tagging to allow security elements to share information from scanning elements.
It is a large cloud-based security ecosystem with global correlation.
It is a stand-alone appliance managed from a central policy console.
It is a perimeter-based, stand-alone network scanning device.
16. Which statement about network security within the SecureX architecture is true?
>> 
It is located closer to the end user.
It is implemented in the network core.
It is enforced in a highly centralized structure.
It is managed by a single policy.
17. Which Cisco SecureX product family would be primarily responsible for detecting and blocking attacks and exploits, while preventing intruder access?
secure e-mail and web
secure access
secure mobility
secure data center
>> 
secure network
18. Which SecureX product family would include Cisco AnyConnect?
secure network
secure e-mail and web
secure access
>> 
secure mobility
secure data center
19. If a web browser is to be used, and not a hardware or software-based client, which Cisco solution is best for establishing a secure VPN connection?
>> 
VPN Services for Cisco ASA Series
Cisco Adaptive Wireless IPS Software
Cisco AnyConnect Secure Mobility Solutions
Cisco Virtual Security Gateway
20. Which Cisco secure access solution can be used to determine if hosts are compliant with security policies?
>> 
Network Admission Control Appliance
Cisco Secure Access Control System
Cisco AnyConnect Secure Mobility Solutions
Cisco Adaptive Wireless IPS Software
21. What protocol is used by SCP for secure transport?
IPSec
HTTPS
>> 
SSH
Telnet
TFTP