Professional Documents
Culture Documents
11. Which three detailed documents are used by security staff for an organization to
implement the security policies? (Choose three.)
asset inventory
best practices
guidelines
procedures
risk assessment
standards
12. What is a feature of an effective network security training program?
Participation in the network security training is voluntary.
Employee groups are identified and the training is customized to their needs.
All employees become trained in the design and implementation of secure
networks.
Training for all employees covers the full scope of security issues related to the
organization.
13. What is a design feature of a secure network life cycle management process?
Security is considered once the network is fully operational.
Security is purposefully included in every
every phase of the system development life
cycle.
Security requirements are assessed and fully implemented in the initiation phase
of the system development life cycle.
Security cost and reporting considerations are determined in the operations and
maintenance phase of the system development life cycle.
14. What are the two major components of a security awareness program? (Choose
two.)
awareness campaign
security policy development
security solution development
self-defending
defending network implementation
training and education
15. Which three documents comprise the hierarchical structure of a comprehensive
security policy for an organization? (Choose three.)
backup policy
backup policy
server policy
incident policy
governing policy
end-user policy
technical policy
16. When an organization implements the two-person
two person control principle, how are tasks
handled?
A task requires two individuals who review
review and approve the work of each other.
A task is broken down into two parts, and each part is assigned to a different
individual.
A task must be completed twice by two operators who must achieve the same
results.
A task is rotated among individuals within a team, each completing the entire
task for a specific amount of time.
17. Which network security test requires a network administrator to launch an attack
within the network?
network scan
password crack
penetration test
vulnerability scan
18. Which principle of the Cisco Self-Defending
Self Defending Network emphasizes that security
should be built in?
adapt
collaborate
integrate
simplify
19.