SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Security
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 30 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the ALE and how is it calculated?
1. Emergency Response 2. Recovery 3. Return to Normal Operations
ALE = Monetary value to justify expense of security solutions AV = total cost of an asset EF = % representing percentage of loss that an asset experiences ARO = How many times per year a threat occurs
1. Separate duties (dual operator - two-man control) 2. Rotate duties (allows peer review) 3. System failure preparation (Trusted recovery) 4. Multiple personnel oversee configuration changes to anticipate issues
Application that provides IPS services on a host.
2. SDLC: Implementation
Monitors security devices and applications: Uses event correlation to collect events from multiple devices - reducing the number of false positives - Identified appropriate mitigation strategies - Uses Cisco NetFlow technology to more readily identif
1. Inspection of security system 2. System integration 3. Security certification 4. Security accreditation
Security Device Manager provides GUI for configuring security features (e.g. IPS - IPSec site-site VPN - firewall features)
An application used to configure security features on a variety of IOS-based routers - ASA 5500 - PIX 500 - IPS 4200 - Catalyst 6500 through a graphical interface. Also provides a centralized policy and inter-operates with Cisco ACS.
3. Cisco Security Products: HIPS
Host-based Intrusion Prevention System (HIPS) - Example Cisco Security Agent
Security Device Manager provides GUI for configuring security features (e.g. IPS - IPSec site-site VPN - firewall features)
4. What are the 4 Operations Security Recommendations
Cisco PIX 500 series of security appliances offer firewall and VPN-termination features.
1. Separate duties (dual operator - two-man control) 2. Rotate duties (allows peer review) 3. System failure preparation (Trusted recovery) 4. Multiple personnel oversee configuration changes to anticipate issues
Qualitative mathematically models the probability and severity of a risk while Quantitative uses a scenario model (better for big deployments)
1. Information preservation 2. Media sanitation 3. Hardware and software disposal
5. SDLC Acquisition and Development Phase
1. Categorize severity of a security breach 2. Preliminary (high-level) risk assessment
1. Non-disaster: Brief interruption 2. Disaster: Interruption 1-7 days 3. Catastrophe: Move to alternative site - all resources destroyed.
1. Formalized risk assessment 2. Security functional requirements 3. Security assurance/legal requirements 4. Cost considerations 5. Security planning (security controls in use) 6. Design and development of security controls 7. Basic testing
Many Cisco IOS routers can be configured with Intrusion Prevention System (IPS) - virtual private network (VPN) and firewall features.
6. Cisco Security Products: Cisco Security Agent (CSA)
Monitors security devices and applications: Uses event correlation to collect events from multiple devices - reducing the number of false positives - Identified appropriate mitigation strategies - Uses Cisco NetFlow technology to more readily identif
Application that provides IPS services on a host.
1. Hot site: completely redundant site 2. Warm site: similar - but outdated equipment 3. Cold site: network needs to be built from scratch
1. Categorize severity of a security breach 2. Preliminary (high-level) risk assessment
7. What are the 3 phases of disaster recovery?
Consists of a collection of security solutions to identify - prevent and adapt to emerging threats.
1. Emergency Response 2. Recovery 3. Return to Normal Operations
1. Categorize severity of a security breach 2. Preliminary (high-level) risk assessment
Application that provides IPS services on a host.
8. SDLC Initiation Phase
Cisco PIX 500 series of security appliances offer firewall and VPN-termination features.
1. Hot site: completely redundant site 2. Warm site: similar - but outdated equipment 3. Cold site: network needs to be built from scratch
1. Categorize severity of a security breach 2. Preliminary (high-level) risk assessment
Many Cisco IOS routers can be configured with Intrusion Prevention System (IPS) - virtual private network (VPN) and firewall features.
9. What is the difference between a Qualitative analysis and a Quantitative Analysis
Many Cisco IOS routers can be configured with Intrusion Prevention System (IPS) - virtual private network (VPN) and firewall features.
Module that goes in a Catalyst 6500 or similar to provide firewall services between VLANs.
1. Formalized risk assessment 2. Security functional requirements 3. Security assurance/legal requirements 4. Cost considerations 5. Security planning (security controls in use) 6. Design and development of security controls 7. Basic testing
Qualitative mathematically models the probability and severity of a risk while Quantitative uses a scenario model (better for big deployments)
10. What are the characteristics of the Cisco Self-Defending Network?
Integrated - Collaborative - Adaptive
Consists of a collection of security solutions to identify - prevent and adapt to emerging threats.
1. Hot site: completely redundant site 2. Warm site: similar - but outdated equipment 3. Cold site: network needs to be built from scratch
Module that goes in a Catalyst 6500 or similar to provide firewall services between VLANs.
11. What are the 5 phases of the System Development Life Cycle (SDLC)?
1. Initiation 2. Acquisition and development 3. Implementation 4. Operations and maintenance 5. Disposition
1. Relocating operations to another facility while the original facility is under repair 2. Using alternative forms of internal and external communication
1. Inspection of security system 2. System integration 3. Security certification 4. Security accreditation
Integrated - Collaborative - Adaptive
12. SDLC: Disposition
Consists of a collection of security solutions to identify - prevent and adapt to emerging threats.
1. Relocating operations to another facility while the original facility is under repair 2. Using alternative forms of internal and external communication
Cisco 5500 Adaptive Security Appliances (ASA) offers a wide variety of security solutions such as firewall - IPS - VPN - anti-spyware - antivirus - and anti-phishing.
1. Information preservation 2. Media sanitation 3. Hardware and software disposal
13. What are two types of risk mitigation
Cisco PIX 500 series of security appliances offer firewall and VPN-termination features.
Application that provides AAA funtionality
Risk Management: keeping damange to a minimum - Risk Avoidance: preventing risk from occuring
1. Configuration management and control 2. Continuous monitoring
14. What is 'Operations Security?'
Monitors security devices and applications: Uses event correlation to collect events from multiple devices - reducing the number of false positives - Identified appropriate mitigation strategies - Uses Cisco NetFlow technology to more readily identif
An attempt to secure hardware - software - and various media while investigating anomalous network behavior.
Cisco PIX 500 series of security appliances offer firewall and VPN-termination features.
Risk Management: keeping damange to a minimum - Risk Avoidance: preventing risk from occuring
15. What are the 3 classifications of disruptions?
1. Formalized risk assessment 2. Security functional requirements 3. Security assurance/legal requirements 4. Cost considerations 5. Security planning (security controls in use) 6. Design and development of security controls 7. Basic testing
Application that provides IPS services on a host.
1. Relocating operations to another facility while the original facility is under repair 2. Using alternative forms of internal and external communication
1. Non-disaster: Brief interruption 2. Disaster: Interruption 1-7 days 3. Catastrophe: Move to alternative site - all resources destroyed.
16. What are two primary goals of business continuity planning?
Many Cisco IOS routers can be configured with Intrusion Prevention System (IPS) - virtual private network (VPN) and firewall features.
1. Non-disaster: Brief interruption 2. Disaster: Interruption 1-7 days 3. Catastrophe: Move to alternative site - all resources destroyed.
1. Relocating operations to another facility while the original facility is under repair 2. Using alternative forms of internal and external communication
17. Cisco Security Products: SDM
Risk Management: keeping damange to a minimum - Risk Avoidance: preventing risk from occuring
Security Device Manager provides GUI for configuring security features (e.g. IPS - IPSec site-site VPN - firewall features)
Cisco PIX 500 series of security appliances offer firewall and VPN-termination features.
Module that goes in a Catalyst 6500 or similar to provide firewall services between VLANs.
18. What is the Cisco Security Manager?
1. Non-disaster: Brief interruption 2. Disaster: Interruption 1-7 days 3. Catastrophe: Move to alternative site - all resources destroyed.
1. Formalized risk assessment 2. Security functional requirements 3. Security assurance/legal requirements 4. Cost considerations 5. Security planning (security controls in use) 6. Design and development of security controls 7. Basic testing
An application used to configure security features on a variety of IOS-based routers - ASA 5500 - PIX 500 - IPS 4200 - Catalyst 6500 through a graphical interface. Also provides a centralized policy and inter-operates with Cisco ACS.
19. Cisco Security Products: PIX 500
1. Formalized risk assessment 2. Security functional requirements 3. Security assurance/legal requirements 4. Cost considerations 5. Security planning (security controls in use) 6. Design and development of security controls 7. Basic testing
1. Non-disaster: Brief interruption 2. Disaster: Interruption 1-7 days 3. Catastrophe: Move to alternative site - all resources destroyed.
Cisco PIX 500 series of security appliances offer firewall and VPN-termination features.
20. Cisco Security Products: 4200 Series IPS
Application that provides AAA funtionality
1. Emergency Response 2. Recovery 3. Return to Normal Operations
Risk Management: keeping damange to a minimum - Risk Avoidance: preventing risk from occuring
Analyze inline traffic for malicious activity. IPS can drop offending traffic - instruct appliances to block specific host - send alerts etc.
21. What are the components (hierarchy) of the Cisco Self-Defending Network?
Risk Management: keeping damange to a minimum - Risk Avoidance: preventing risk from occuring
Many Cisco IOS routers can be configured with Intrusion Prevention System (IPS) - virtual private network (VPN) and firewall features.
Analyze inline traffic for malicious activity. IPS can drop offending traffic - instruct appliances to block specific host - send alerts etc.
22. What is MARS?
1. Categorize severity of a security breach 2. Preliminary (high-level) risk assessment
Monitors security devices and applications: Uses event correlation to collect events from multiple devices - reducing the number of false positives - Identified appropriate mitigation strategies - Uses Cisco NetFlow technology to more readily identif
Integrated - Collaborative - Adaptive
Security Device Manager provides GUI for configuring security features (e.g. IPS - IPSec site-site VPN - firewall features)
23. Cisco Security Products: IOS Router
Many Cisco IOS routers can be configured with Intrusion Prevention System (IPS) - virtual private network (VPN) and firewall features.
1. Non-disaster: Brief interruption 2. Disaster: Interruption 1-7 days 3. Catastrophe: Move to alternative site - all resources destroyed.
Monitors security devices and applications: Uses event correlation to collect events from multiple devices - reducing the number of false positives - Identified appropriate mitigation strategies - Uses Cisco NetFlow technology to more readily identif
Cisco PIX 500 series of security appliances offer firewall and VPN-termination features.
24. What are the components of a Security Policy?
1. Relocating operations to another facility while the original facility is under repair 2. Using alternative forms of internal and external communication
1. Hot site: completely redundant site 2. Warm site: similar - but outdated equipment 3. Cold site: network needs to be built from scratch
Monitors security devices and applications: Uses event correlation to collect events from multiple devices - reducing the number of false positives - Identified appropriate mitigation strategies - Uses Cisco NetFlow technology to more readily identif
25. Cisco Security Products: ASA 5500
Cisco 5500 Adaptive Security Appliances (ASA) offers a wide variety of security solutions such as firewall - IPS - VPN - anti-spyware - antivirus - and anti-phishing.
1. Emergency Response 2. Recovery 3. Return to Normal Operations
Qualitative mathematically models the probability and severity of a risk while Quantitative uses a scenario model (better for big deployments)
1. Categorize severity of a security breach 2. Preliminary (high-level) risk assessment
26. Cisco Security Products: Firewall Services Module (FWSM)
1. Inspection of security system 2. System integration 3. Security certification 4. Security accreditation
Module that goes in a Catalyst 6500 or similar to provide firewall services between VLANs.
Application that provides AAA funtionality
1. Separate duties (dual operator - two-man control) 2. Rotate duties (allows peer review) 3. System failure preparation (Trusted recovery) 4. Multiple personnel oversee configuration changes to anticipate issues
27. What are the 3 types of backup sites?
1. Hot site: completely redundant site 2. Warm site: similar - but outdated equipment 3. Cold site: network needs to be built from scratch
Monitors security devices and applications: Uses event correlation to collect events from multiple devices - reducing the number of false positives - Identified appropriate mitigation strategies - Uses Cisco NetFlow technology to more readily identif
1. Inspection of security system 2. System integration 3. Security certification 4. Security accreditation
An attempt to secure hardware - software - and various media while investigating anomalous network behavior.
28. What is the Cisco Self-Defending Network?
Analyze inline traffic for malicious activity. IPS can drop offending traffic - instruct appliances to block specific host - send alerts etc.
ALE = Monetary value to justify expense of security solutions AV = total cost of an asset EF = % representing percentage of loss that an asset experiences ARO = How many times per year a threat occurs
An attempt to secure hardware - software - and various media while investigating anomalous network behavior.
Consists of a collection of security solutions to identify - prevent and adapt to emerging threats.
29. SDLC: Operations and Maintenance Phase
1. Hot site: completely redundant site 2. Warm site: similar - but outdated equipment 3. Cold site: network needs to be built from scratch
Monitors security devices and applications: Uses event correlation to collect events from multiple devices - reducing the number of false positives - Identified appropriate mitigation strategies - Uses Cisco NetFlow technology to more readily identif
ALE = Monetary value to justify expense of security solutions AV = total cost of an asset EF = % representing percentage of loss that an asset experiences ARO = How many times per year a threat occurs
1. Configuration management and control 2. Continuous monitoring
30. Cisco Security Products: Cisco Secure Access Control Server (ACS)
Security Device Manager provides GUI for configuring security features (e.g. IPS - IPSec site-site VPN - firewall features)
Application that provides AAA funtionality
1. Formalized risk assessment 2. Security functional requirements 3. Security assurance/legal requirements 4. Cost considerations 5. Security planning (security controls in use) 6. Design and development of security controls 7. Basic testing
1. Initiation 2. Acquisition and development 3. Implementation 4. Operations and maintenance 5. Disposition