1. In which
phase of the system development life cycle should security requirements be
addressed?
|
|
|
Add security requirements during the initiation phase.
|
|
>>
|
Include a minimum set of
security requirements at each phase.
|
|
|
Apply critical security requirements during the
implementation phase.
|
|
|
Implement the majority of the security requirements at
the acquisition phase.
|
|
|
|
2. Which type of
analysis uses a mathematical model that assigns a monetary figure to the
value of assets, the cost of threats being realized, and the cost of security
implementations?
|
|
|
Qualitative Risk Analysis
|
|
>>
|
Quantitative Risk Analysis
|
|
|
Qualitative Asset Analysis
|
|
|
Quantitative Continuity Analysis
|
|
3. Which term
describes a completely redundant backup facility, with almost identical
equipment to the operational facility, that is maintained in the event of a
disaster?
|
|
|
backup site
|
|
|
cold site
|
|
>>
|
hot site
|
|
|
reserve site
|
|
|
|
4. Which network
security test requires a network administrator to
launch an attack within the network?
|
|
|
network scan
|
|
|
password crack
|
|
>>
|
penetration test
|
|
|
vulnerability scan
|
|
|
|
5. Which three
documents comprise the hierarchical structure of a comprehensive security
policy for an organization? (Choose three.)
|
|
|
backup policy
|
|
|
server policy
|
|
|
incident policy
|
|
>>
|
governing policy
|
|
>>
|
end-user policy
|
|
>>
|
technical policy
|
|
|
|
6. Which three
detailed documents are used by security staff for an organization to
implement the security policies? (Choose three.)
|
|
|
asset inventory
|
|
|
best practices
|
|
>>
|
guidelines
|
|
>>
|
procedures
|
|
|
risk assessment
|
|
>>
|
standards
|
|
|
|
7. What are the
two major components of a security awareness program? (Choose two.)
|
|
>>
|
awareness campaign
|
|
|
security policy development
|
|
|
security solution development
|
|
|
self-defending network implementation
|
|
>>
|
training and education
|
|
|
|
8. When an
organization implements the two-person control principle, how are tasks
handled?
|
|
>>
|
A task requires two
individuals who review and approve the work of each other.
|
|
|
A task is broken down into two parts, and each part is
assigned to a different individual.
|
|
|
A task must be completed twice by two operators who
must achieve the same results.
|
|
|
A task is rotated among individuals within a team, each
completing the entire task for a specific amount of time.
|
|
|
|
9. Which
component of the security policy lists specific websites, newsgroups, or
bandwidth-intensive applications that are not allowed on the company network?
|
|
|
remote access policies
|
|
>>
|
acceptable use policies
|
|
|
incident handling procedures
|
|
|
identification and authentication policies
|
|
|
|
10. Which
security document includes implementation details, usually with step-by-step
instructions and graphics?
|
|
|
guideline document
|
|
|
standard document
|
|
>>
|
procedure document
|
|
|
overview document
|
|
|
|
11. Which option
describes ethics?
|
|
>>
|
Ethics is a standard that
is higher than the law.
|
|
|
Ethics involves government agencies enforcing
regulations.
|
|
|
Ethics compliance is the basis for setting security
policies.
|
|
|
Ethics deals with criminal law and monetary
compensation.
|
|
|
|
12. In the Cisco
SecureX architecture, which component is considered the workhorse of policy
enforcement?
|
|
|
next-generation endpoint
|
|
|
policy management console
|
|
>>
|
scanning engine
|
|
|
Security Intelligence Operations
|
|
|
|
13. Which
development has contributed most to the growing demand for a borderless
network?
|
|
>>
|
consumer endpoints
|
|
|
DMZ services
|
|
|
corporate managed laptops
|
|
|
personal firewall software
|
|
|
|
14. Which aspect
of a scanning element is able to determine a security policy to apply based on information such as the person using the
device, the location of the device, and the application being used?
|
|
>>
|
context awareness
|
|
|
perimeter awareness
|
|
|
centralized enforcement
|
|
|
perimeter deployment
|
|
|
|
15. A company is
considering implementing the Cisco SecureX security architecture. What is the
purpose of Cisco TrustSec?
|
|
>>
|
It is a technology that
implements packet tagging to allow security elements to share information
from scanning elements.
|
|
|
It is a large cloud-based security ecosystem with
global correlation.
|
|
|
It is a stand-alone appliance managed from a central
policy console.
|
|
|
It is a perimeter-based, stand-alone network scanning
device.
|
|
|
|
16. Which
statement about network security within the SecureX architecture is true?
|
|
>>
|
It is located closer to the
end user.
|
|
|
It is implemented in the network core.
|
|
|
It is enforced in a highly centralized structure.
|
|
|
It is managed by a single policy.
|
|
|
|
17. Which Cisco
SecureX product family would be primarily responsible for detecting and
blocking attacks and exploits, while preventing intruder access?
|
|
|
secure e-mail and web
|
|
|
secure access
|
|
|
secure mobility
|
|
|
secure data center
|
|
>>
|
secure network
|
|
|
|
18. Which
SecureX product family would include Cisco AnyConnect?
|
|
|
secure network
|
|
|
secure e-mail and web
|
|
|
secure access
|
|
>>
|
secure mobility
|
|
|
secure data center
|
|
|
|
19. If a web
browser is to be used, and not a hardware or software-based client, which
Cisco solution is best for establishing a secure VPN
connection?
|
|
>>
|
VPN Services for Cisco ASA
Series
|
|
|
Cisco Adaptive Wireless IPS Software
|
|
|
Cisco AnyConnect Secure Mobility Solutions
|
|
|
Cisco Virtual Security Gateway
|
|
|
|
20. Which Cisco
secure access solution can be used to determine if hosts are compliant with
security policies?
|
|
>>
|
Network Admission Control
Appliance
|
|
|
Cisco Secure Access Control System
|
|
|
Cisco AnyConnect Secure Mobility Solutions
|
|
|
Cisco Adaptive Wireless IPS Software
|
|
|
|
21. What
protocol is used by SCP for secure transport?
|
|
|
IPSec
|
|
|
HTTPS
|
|
>>
|
SSH
|
|
|
Telnet
|
|
|
TFTP
|
No comments:
Post a Comment