This action might not be possible to undo. Are you sure you want to continue?
1 What are the two major elements of the Cisco Secure Communications solution? (Choose two.) secure communications for extranets secure communications for intranets secure communications for management secure communications for remote access secure communications for site-to-site connections Which component of the security policy lists specific websites, newsgroups, or bandwidth-intensive applications that are not allowed on the company network? remote access policies acceptable use policies incident handling procedures identification and authentication policies What are the two major components of a security awareness program? (Choose two.) awareness campaign security policy development security solution development self-defending network implementation training and education Which term describes a completely redundant backup facility, with almost identical equipment to the operational facility, that is maintained in the event of a disaster? backup site cold site hot site reserve site What are three benefits of a comprehensive security policy? (Choose three.) defines legal consequences of violations ensures consistency in system operations ensures diversity in system operations, software and hardware acquisition and use, and maintenance identifies reputable network equipment providers sets the rules for expected behavior provides a database for information assets Which two Cisco Threat Control and Containment technologies address endpoint security?
(Choose two.) Cisco Application Control Engine Cisco Network Admission Control Cisco Security Agent Cisco Security Monitoring, Analysis, and Response System virtual private network What are three key principles of a Cisco Self-Defending Network? (Choose three.) adaptability authentication collaboration confidentiality integration integrity Which three detailed documents are used by security staff for an organization to implement the security policies? (Choose three.) asset inventory best practices guidelines procedures risk assessment standards Which security document includes implementation details, usually with step-by-step instructions and graphics? guideline document standard document procedure document overview document 1 When an organization implements the two-person control principle, how are tasks handled? A task requires two individuals who review and approve the work of each other. A task is broken down into two parts, and each part is assigned to a different individual. A task must be completed twice by two operators who must achieve the same results. A task is rotated among individuals within a team, each completing the entire task for a specific amount of time. Which policy includes standards regarding the installation and update of endpoint threat-control software?
distribution policy end-user policy management policy technical policy 1 Which three statements describe ethics in network security? (Choose three.) principles put into action in place of laws foundations for current laws set of moral principles that govern civil behavior standard that is higher than the law set of regulations established by the judiciary system set of legal standards that specify enforceable actions when the law is broken
13 What are the two components in the Cisco Security Management Suite? (Choose two.) Cisco Intrusion Prevention Cisco Network Admission Control Cisco Security Agent Cisco Security Manager Cisco Security MARS 14 In which phase of the system development life cycle should security requirements be addressed? Add security requirements during the initiation phase. Include a minimum set of security requirements at each phase. Apply critical security requirements during the implementation phase. Implement the majority of the security requirements at the acquisition phase.
15 Which security services, available through the Cisco Self-Defending Network, include VPN access? secure communications threat control and containment operational control and policy management application control for infrastructure 16 Which type of analysis uses a mathematical model that assigns a monetary figure to the value of assets, the cost of threats being realized, and the cost of security implementations? Qualitative Risk Analysis Quantitative Risk Analysis Qualitative Asset Analysis Quantitative Continuity Analysis 17 Which principle of the Cisco Self-Defending Network emphasizes that security should be built in? adapt
collaborate integrate simplify 18
Refer to the exhibit. When implementing the Cisco Self-Defending Network, which two technologies ensure confidentiality when referring to secure communications? (Choose two.) Cisco NAC appliances and Cisco Security Agent Cisco Security Manager Cisco Security Monitoring, Analysis, and Response System Intrusion Prevention System IPsec VPN SSL VPN Which three documents comprise the hierarchical structure of a comprehensive security policy for an 19 organization? (Choose three.) backup policy server policy incident policy governing policy end-user policy technical policy
20 Which network security test requires a network administrator to launch an attack within the network? network scan password crack penetration test vulnerability scan 21 What is the primary focus of network operations security? to design and develop secure application code to support deployment and periodic maintenance of secure systems to conduct regular employee background checks to reprimand personnel who do not adhere to security policies