You are on page 1of 5

CCNAS Module 9

1
What are the two major elements of the Cisco Secure Communications solution? (Choose two.)
secure communications for extranets
secure communications for intranets
secure communications for management
secure communications for remote access
secure communications for site-to-site connections

Which component of the security policy lists specific websites, newsgroups, or bandwidth-intensive
2 applications that are not allowed on the company network?
remote access policies
acceptable use policies
incident handling procedures
identification and authentication policies

3 What are the two major components of a security awareness program? (Choose two.)
awareness campaign
security policy development
security solution development
self-defending network implementation
training and education

Which term describes a completely redundant backup facility, with almost identical equipment to
4 the operational facility, that is maintained in the event of a disaster?
backup site
cold site
hot site
reserve site

5 What are three benefits of a comprehensive security policy? (Choose three.)


defines legal consequences of violations
ensures consistency in system operations
ensures diversity in system operations, software and hardware acquisition and use, and
maintenance
identifies reputable network equipment providers
sets the rules for expected behavior
provides a database for information assets

Which two Cisco Threat Control and Containment technologies address endpoint security?
6 (Choose two.)
Cisco Application Control Engine
Cisco Network Admission Control
Cisco Security Agent
Cisco Security Monitoring, Analysis, and Response System
virtual private network

7 What are three key principles of a Cisco Self-Defending Network? (Choose three.)
adaptability
authentication
collaboration
confidentiality
integration
integrity

Which three detailed documents are used by security staff for an organization to implement the
8 security policies? (Choose three.)
asset inventory
best practices
guidelines
procedures
risk assessment
standards

9 Which security document includes implementation details, usually with step-by-step instructions
and graphics?
guideline document
standard document
procedure document
overview document

1 When an organization implements the two-person control principle, how are tasks handled?
0 A task requires two individuals who review and approve the work of each other.
A task is broken down into two parts, and each part is assigned to a different individual.
A task must be completed twice by two operators who must achieve the same results.
A task is rotated among individuals within a team, each completing the entire task for a specific
amount of time.

11 Which policy includes standards regarding the installation and update of endpoint threat-control
software?
distribution policy
end-user policy
management policy
technical policy

1 Which three statements describe ethics in network security? (Choose three.)


2 principles put into action in place of laws
foundations for current laws
set of moral principles that govern civil behavior
standard that is higher than the law
set of regulations established by the judiciary system
set of legal standards that specify enforceable actions when the law is broken

13 What are the two components in the Cisco Security Management Suite? (Choose two.)
Cisco Intrusion Prevention
Cisco Network Admission Control
Cisco Security Agent
Cisco Security Manager
Cisco Security MARS

In which phase of the system development life cycle should security requirements be addressed?
14 Add security requirements during the initiation phase.
Include a minimum set of security requirements at each phase.
Apply critical security requirements during the implementation phase.
Implement the majority of the security requirements at the acquisition phase.

15 Which security services, available through the Cisco Self-Defending Network, include VPN access?
secure communications
threat control and containment
operational control and policy management
application control for infrastructure
16 Which type of analysis uses a mathematical model that assigns a monetary figure to the value
of assets, the cost of threats being realized, and the cost of security implementations?
Qualitative Risk Analysis
Quantitative Risk Analysis
Qualitative Asset Analysis
Quantitative Continuity Analysis

Which principle of the Cisco Self-Defending Network emphasizes that security should be built in?
17 adapt
collaborate
integrate
simplify

18

Refer to the exhibit. When implementing the Cisco Self-Defending Network, which two technologies
ensure confidentiality when referring to secure communications? (Choose two.)
Cisco NAC appliances and Cisco Security Agent
Cisco Security Manager
Cisco Security Monitoring, Analysis, and Response System
Intrusion Prevention System
IPsec VPN
SSL VPN

Which three documents comprise the hierarchical structure of a comprehensive security policy for an
19 organization? (Choose three.)
backup policy
server policy
incident policy
governing policy
end-user policy
technical policy
20 Which network security test requires a network administrator to launch an attack within the network?
network scan
password crack
penetration test
vulnerability scan

What is the primary focus of network operations security?


21 to design and develop secure application code
to support deployment and periodic maintenance of secure systems
to conduct regular employee background checks
to reprimand personnel who do not adhere to security policies

You might also like