SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Security
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 30 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What are the 3 phases of disaster recovery?
1. Configuration management and control 2. Continuous monitoring
Consists of a collection of security solutions to identify - prevent and adapt to emerging threats.
1. Emergency Response 2. Recovery 3. Return to Normal Operations
Monitors security devices and applications: Uses event correlation to collect events from multiple devices - reducing the number of false positives - Identified appropriate mitigation strategies - Uses Cisco NetFlow technology to more readily identif
2. What are the components of a Security Policy?
1. Separate duties (dual operator - two-man control) 2. Rotate duties (allows peer review) 3. System failure preparation (Trusted recovery) 4. Multiple personnel oversee configuration changes to anticipate issues
Many Cisco IOS routers can be configured with Intrusion Prevention System (IPS) - virtual private network (VPN) and firewall features.
1. Formalized risk assessment 2. Security functional requirements 3. Security assurance/legal requirements 4. Cost considerations 5. Security planning (security controls in use) 6. Design and development of security controls 7. Basic testing
3. Cisco Security Products: HIPS
Application that provides IPS services on a host.
Cisco PIX 500 series of security appliances offer firewall and VPN-termination features.
Host-based Intrusion Prevention System (HIPS) - Example Cisco Security Agent
1. Separate duties (dual operator - two-man control) 2. Rotate duties (allows peer review) 3. System failure preparation (Trusted recovery) 4. Multiple personnel oversee configuration changes to anticipate issues
4. Cisco Security Products: Cisco Security Agent (CSA)
An application used to configure security features on a variety of IOS-based routers - ASA 5500 - PIX 500 - IPS 4200 - Catalyst 6500 through a graphical interface. Also provides a centralized policy and inter-operates with Cisco ACS.
1. Relocating operations to another facility while the original facility is under repair 2. Using alternative forms of internal and external communication
Risk Management: keeping damange to a minimum - Risk Avoidance: preventing risk from occuring
Application that provides IPS services on a host.
5. SDLC: Disposition
1. Information preservation 2. Media sanitation 3. Hardware and software disposal
Security Device Manager provides GUI for configuring security features (e.g. IPS - IPSec site-site VPN - firewall features)
An attempt to secure hardware - software - and various media while investigating anomalous network behavior.
1. Inspection of security system 2. System integration 3. Security certification 4. Security accreditation
6. What are the 3 types of backup sites?
Analyze inline traffic for malicious activity. IPS can drop offending traffic - instruct appliances to block specific host - send alerts etc.
1. Hot site: completely redundant site 2. Warm site: similar - but outdated equipment 3. Cold site: network needs to be built from scratch
1. Inspection of security system 2. System integration 3. Security certification 4. Security accreditation
Monitors security devices and applications: Uses event correlation to collect events from multiple devices - reducing the number of false positives - Identified appropriate mitigation strategies - Uses Cisco NetFlow technology to more readily identif
7. What are the characteristics of the Cisco Self-Defending Network?
1. Inspection of security system 2. System integration 3. Security certification 4. Security accreditation
Application that provides AAA funtionality
Security Device Manager provides GUI for configuring security features (e.g. IPS - IPSec site-site VPN - firewall features)
Integrated - Collaborative - Adaptive
8. SDLC Acquisition and Development Phase
1. Categorize severity of a security breach 2. Preliminary (high-level) risk assessment
1. Initiation 2. Acquisition and development 3. Implementation 4. Operations and maintenance 5. Disposition
1. Formalized risk assessment 2. Security functional requirements 3. Security assurance/legal requirements 4. Cost considerations 5. Security planning (security controls in use) 6. Design and development of security controls 7. Basic testing
An attempt to secure hardware - software - and various media while investigating anomalous network behavior.
9. Cisco Security Products: 4200 Series IPS
1. Configuration management and control 2. Continuous monitoring
1. Non-disaster: Brief interruption 2. Disaster: Interruption 1-7 days 3. Catastrophe: Move to alternative site - all resources destroyed.
Analyze inline traffic for malicious activity. IPS can drop offending traffic - instruct appliances to block specific host - send alerts etc.
1. Hot site: completely redundant site 2. Warm site: similar - but outdated equipment 3. Cold site: network needs to be built from scratch
10. What is 'Operations Security?'
Risk Management: keeping damange to a minimum - Risk Avoidance: preventing risk from occuring
1. Hot site: completely redundant site 2. Warm site: similar - but outdated equipment 3. Cold site: network needs to be built from scratch
An attempt to secure hardware - software - and various media while investigating anomalous network behavior.
1. Formalized risk assessment 2. Security functional requirements 3. Security assurance/legal requirements 4. Cost considerations 5. Security planning (security controls in use) 6. Design and development of security controls 7. Basic testing
11. Cisco Security Products: Cisco Secure Access Control Server (ACS)
Application that provides AAA funtionality
An application used to configure security features on a variety of IOS-based routers - ASA 5500 - PIX 500 - IPS 4200 - Catalyst 6500 through a graphical interface. Also provides a centralized policy and inter-operates with Cisco ACS.
1. Formalized risk assessment 2. Security functional requirements 3. Security assurance/legal requirements 4. Cost considerations 5. Security planning (security controls in use) 6. Design and development of security controls 7. Basic testing
1. Hot site: completely redundant site 2. Warm site: similar - but outdated equipment 3. Cold site: network needs to be built from scratch
12. What are two types of risk mitigation
1. Initiation 2. Acquisition and development 3. Implementation 4. Operations and maintenance 5. Disposition
Risk Management: keeping damange to a minimum - Risk Avoidance: preventing risk from occuring
Application that provides AAA funtionality
Monitors security devices and applications: Uses event correlation to collect events from multiple devices - reducing the number of false positives - Identified appropriate mitigation strategies - Uses Cisco NetFlow technology to more readily identif
13. Cisco Security Products: PIX 500
An application used to configure security features on a variety of IOS-based routers - ASA 5500 - PIX 500 - IPS 4200 - Catalyst 6500 through a graphical interface. Also provides a centralized policy and inter-operates with Cisco ACS.
Security Device Manager provides GUI for configuring security features (e.g. IPS - IPSec site-site VPN - firewall features)
Cisco PIX 500 series of security appliances offer firewall and VPN-termination features.
1. Inspection of security system 2. System integration 3. Security certification 4. Security accreditation
14. Cisco Security Products: Firewall Services Module (FWSM)
Module that goes in a Catalyst 6500 or similar to provide firewall services between VLANs.
1. Emergency Response 2. Recovery 3. Return to Normal Operations
ALE = Monetary value to justify expense of security solutions AV = total cost of an asset EF = % representing percentage of loss that an asset experiences ARO = How many times per year a threat occurs
1. Configuration management and control 2. Continuous monitoring
15. What is the ALE and how is it calculated?
1. Formalized risk assessment 2. Security functional requirements 3. Security assurance/legal requirements 4. Cost considerations 5. Security planning (security controls in use) 6. Design and development of security controls 7. Basic testing
ALE = Monetary value to justify expense of security solutions AV = total cost of an asset EF = % representing percentage of loss that an asset experiences ARO = How many times per year a threat occurs
1. Configuration management and control 2. Continuous monitoring
16. What is the Cisco Self-Defending Network?
Integrated - Collaborative - Adaptive
An attempt to secure hardware - software - and various media while investigating anomalous network behavior.
Consists of a collection of security solutions to identify - prevent and adapt to emerging threats.
1. Formalized risk assessment 2. Security functional requirements 3. Security assurance/legal requirements 4. Cost considerations 5. Security planning (security controls in use) 6. Design and development of security controls 7. Basic testing
17. What are the 5 phases of the System Development Life Cycle (SDLC)?
Application that provides AAA funtionality
Many Cisco IOS routers can be configured with Intrusion Prevention System (IPS) - virtual private network (VPN) and firewall features.
Risk Management: keeping damange to a minimum - Risk Avoidance: preventing risk from occuring
1. Initiation 2. Acquisition and development 3. Implementation 4. Operations and maintenance 5. Disposition
18. Cisco Security Products: ASA 5500
1. Hot site: completely redundant site 2. Warm site: similar - but outdated equipment 3. Cold site: network needs to be built from scratch
Security Device Manager provides GUI for configuring security features (e.g. IPS - IPSec site-site VPN - firewall features)
Cisco 5500 Adaptive Security Appliances (ASA) offers a wide variety of security solutions such as firewall - IPS - VPN - anti-spyware - antivirus - and anti-phishing.
1. Inspection of security system 2. System integration 3. Security certification 4. Security accreditation
19. What are the 3 classifications of disruptions?
Consists of a collection of security solutions to identify - prevent and adapt to emerging threats.
1. Non-disaster: Brief interruption 2. Disaster: Interruption 1-7 days 3. Catastrophe: Move to alternative site - all resources destroyed.
Analyze inline traffic for malicious activity. IPS can drop offending traffic - instruct appliances to block specific host - send alerts etc.
20. What are the 4 Operations Security Recommendations
1. Separate duties (dual operator - two-man control) 2. Rotate duties (allows peer review) 3. System failure preparation (Trusted recovery) 4. Multiple personnel oversee configuration changes to anticipate issues
1. Formalized risk assessment 2. Security functional requirements 3. Security assurance/legal requirements 4. Cost considerations 5. Security planning (security controls in use) 6. Design and development of security controls 7. Basic testing
Cisco 5500 Adaptive Security Appliances (ASA) offers a wide variety of security solutions such as firewall - IPS - VPN - anti-spyware - antivirus - and anti-phishing.
1. Configuration management and control 2. Continuous monitoring
21. What are the components (hierarchy) of the Cisco Self-Defending Network?
Consists of a collection of security solutions to identify - prevent and adapt to emerging threats.
Integrated - Collaborative - Adaptive
Qualitative mathematically models the probability and severity of a risk while Quantitative uses a scenario model (better for big deployments)
22. What is MARS?
1. Non-disaster: Brief interruption 2. Disaster: Interruption 1-7 days 3. Catastrophe: Move to alternative site - all resources destroyed.
Monitors security devices and applications: Uses event correlation to collect events from multiple devices - reducing the number of false positives - Identified appropriate mitigation strategies - Uses Cisco NetFlow technology to more readily identif
1. Initiation 2. Acquisition and development 3. Implementation 4. Operations and maintenance 5. Disposition
1. Separate duties (dual operator - two-man control) 2. Rotate duties (allows peer review) 3. System failure preparation (Trusted recovery) 4. Multiple personnel oversee configuration changes to anticipate issues
23. Cisco Security Products: IOS Router
1. Emergency Response 2. Recovery 3. Return to Normal Operations
Many Cisco IOS routers can be configured with Intrusion Prevention System (IPS) - virtual private network (VPN) and firewall features.
Application that provides AAA funtionality
24. SDLC Initiation Phase
ALE = Monetary value to justify expense of security solutions AV = total cost of an asset EF = % representing percentage of loss that an asset experiences ARO = How many times per year a threat occurs
1. Categorize severity of a security breach 2. Preliminary (high-level) risk assessment
Module that goes in a Catalyst 6500 or similar to provide firewall services between VLANs.
Security Device Manager provides GUI for configuring security features (e.g. IPS - IPSec site-site VPN - firewall features)
25. SDLC: Operations and Maintenance Phase
1. Formalized risk assessment 2. Security functional requirements 3. Security assurance/legal requirements 4. Cost considerations 5. Security planning (security controls in use) 6. Design and development of security controls 7. Basic testing
1. Non-disaster: Brief interruption 2. Disaster: Interruption 1-7 days 3. Catastrophe: Move to alternative site - all resources destroyed.
1. Categorize severity of a security breach 2. Preliminary (high-level) risk assessment
1. Configuration management and control 2. Continuous monitoring
26. What are two primary goals of business continuity planning?
Cisco 5500 Adaptive Security Appliances (ASA) offers a wide variety of security solutions such as firewall - IPS - VPN - anti-spyware - antivirus - and anti-phishing.
Risk Management: keeping damange to a minimum - Risk Avoidance: preventing risk from occuring
1. Relocating operations to another facility while the original facility is under repair 2. Using alternative forms of internal and external communication
27. Cisco Security Products: SDM
Module that goes in a Catalyst 6500 or similar to provide firewall services between VLANs.
Integrated - Collaborative - Adaptive
Security Device Manager provides GUI for configuring security features (e.g. IPS - IPSec site-site VPN - firewall features)
1. Information preservation 2. Media sanitation 3. Hardware and software disposal
28. SDLC: Implementation
1. Relocating operations to another facility while the original facility is under repair 2. Using alternative forms of internal and external communication
1. Configuration management and control 2. Continuous monitoring
1. Inspection of security system 2. System integration 3. Security certification 4. Security accreditation
An application used to configure security features on a variety of IOS-based routers - ASA 5500 - PIX 500 - IPS 4200 - Catalyst 6500 through a graphical interface. Also provides a centralized policy and inter-operates with Cisco ACS.
29. What is the difference between a Qualitative analysis and a Quantitative Analysis
1. Hot site: completely redundant site 2. Warm site: similar - but outdated equipment 3. Cold site: network needs to be built from scratch
Qualitative mathematically models the probability and severity of a risk while Quantitative uses a scenario model (better for big deployments)
Application that provides AAA funtionality
Application that provides IPS services on a host.
30. What is the Cisco Security Manager?
ALE = Monetary value to justify expense of security solutions AV = total cost of an asset EF = % representing percentage of loss that an asset experiences ARO = How many times per year a threat occurs
Application that provides IPS services on a host.
An application used to configure security features on a variety of IOS-based routers - ASA 5500 - PIX 500 - IPS 4200 - Catalyst 6500 through a graphical interface. Also provides a centralized policy and inter-operates with Cisco ACS.