SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Security
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 30 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Cisco Security Products: PIX 500
Cisco PIX 500 series of security appliances offer firewall and VPN-termination features.
Many Cisco IOS routers can be configured with Intrusion Prevention System (IPS) - virtual private network (VPN) and firewall features.
1. Separate duties (dual operator - two-man control) 2. Rotate duties (allows peer review) 3. System failure preparation (Trusted recovery) 4. Multiple personnel oversee configuration changes to anticipate issues
1. Information preservation 2. Media sanitation 3. Hardware and software disposal
2. What are the characteristics of the Cisco Self-Defending Network?
Consists of a collection of security solutions to identify - prevent and adapt to emerging threats.
ALE = Monetary value to justify expense of security solutions AV = total cost of an asset EF = % representing percentage of loss that an asset experiences ARO = How many times per year a threat occurs
Integrated - Collaborative - Adaptive
1. Hot site: completely redundant site 2. Warm site: similar - but outdated equipment 3. Cold site: network needs to be built from scratch
3. SDLC: Implementation
ALE = Monetary value to justify expense of security solutions AV = total cost of an asset EF = % representing percentage of loss that an asset experiences ARO = How many times per year a threat occurs
1. Relocating operations to another facility while the original facility is under repair 2. Using alternative forms of internal and external communication
Application that provides AAA funtionality
1. Inspection of security system 2. System integration 3. Security certification 4. Security accreditation
4. Cisco Security Products: SDM
Application that provides IPS services on a host.
Analyze inline traffic for malicious activity. IPS can drop offending traffic - instruct appliances to block specific host - send alerts etc.
Security Device Manager provides GUI for configuring security features (e.g. IPS - IPSec site-site VPN - firewall features)
ALE = Monetary value to justify expense of security solutions AV = total cost of an asset EF = % representing percentage of loss that an asset experiences ARO = How many times per year a threat occurs
5. What are the 3 types of backup sites?
1. Hot site: completely redundant site 2. Warm site: similar - but outdated equipment 3. Cold site: network needs to be built from scratch
1. Configuration management and control 2. Continuous monitoring
Consists of a collection of security solutions to identify - prevent and adapt to emerging threats.
1. Information preservation 2. Media sanitation 3. Hardware and software disposal
6. What is 'Operations Security?'
An attempt to secure hardware - software - and various media while investigating anomalous network behavior.
Module that goes in a Catalyst 6500 or similar to provide firewall services between VLANs.
Risk Management: keeping damange to a minimum - Risk Avoidance: preventing risk from occuring
7. What are the components of a Security Policy?
1. Emergency Response 2. Recovery 3. Return to Normal Operations
An attempt to secure hardware - software - and various media while investigating anomalous network behavior.
1. Inspection of security system 2. System integration 3. Security certification 4. Security accreditation
8. What is MARS?
Application that provides IPS services on a host.
1. Categorize severity of a security breach 2. Preliminary (high-level) risk assessment
Monitors security devices and applications: Uses event correlation to collect events from multiple devices - reducing the number of false positives - Identified appropriate mitigation strategies - Uses Cisco NetFlow technology to more readily identif
Host-based Intrusion Prevention System (HIPS) - Example Cisco Security Agent
9. Cisco Security Products: HIPS
Many Cisco IOS routers can be configured with Intrusion Prevention System (IPS) - virtual private network (VPN) and firewall features.
1. Emergency Response 2. Recovery 3. Return to Normal Operations
Consists of a collection of security solutions to identify - prevent and adapt to emerging threats.
Host-based Intrusion Prevention System (HIPS) - Example Cisco Security Agent
10. What are the 3 phases of disaster recovery?
Application that provides IPS services on a host.
1. Categorize severity of a security breach 2. Preliminary (high-level) risk assessment
1. Emergency Response 2. Recovery 3. Return to Normal Operations
11. Cisco Security Products: IOS Router
Many Cisco IOS routers can be configured with Intrusion Prevention System (IPS) - virtual private network (VPN) and firewall features.
1. Categorize severity of a security breach 2. Preliminary (high-level) risk assessment
1. Formalized risk assessment 2. Security functional requirements 3. Security assurance/legal requirements 4. Cost considerations 5. Security planning (security controls in use) 6. Design and development of security controls 7. Basic testing
Risk Management: keeping damange to a minimum - Risk Avoidance: preventing risk from occuring
12. SDLC Initiation Phase
1. Information preservation 2. Media sanitation 3. Hardware and software disposal
An attempt to secure hardware - software - and various media while investigating anomalous network behavior.
Module that goes in a Catalyst 6500 or similar to provide firewall services between VLANs.
1. Categorize severity of a security breach 2. Preliminary (high-level) risk assessment
13. Cisco Security Products: ASA 5500
1. Separate duties (dual operator - two-man control) 2. Rotate duties (allows peer review) 3. System failure preparation (Trusted recovery) 4. Multiple personnel oversee configuration changes to anticipate issues
1. Formalized risk assessment 2. Security functional requirements 3. Security assurance/legal requirements 4. Cost considerations 5. Security planning (security controls in use) 6. Design and development of security controls 7. Basic testing
Cisco 5500 Adaptive Security Appliances (ASA) offers a wide variety of security solutions such as firewall - IPS - VPN - anti-spyware - antivirus - and anti-phishing.
1. Hot site: completely redundant site 2. Warm site: similar - but outdated equipment 3. Cold site: network needs to be built from scratch
14. Cisco Security Products: Cisco Security Agent (CSA)
1. Information preservation 2. Media sanitation 3. Hardware and software disposal
Application that provides IPS services on a host.
1. Relocating operations to another facility while the original facility is under repair 2. Using alternative forms of internal and external communication
ALE = Monetary value to justify expense of security solutions AV = total cost of an asset EF = % representing percentage of loss that an asset experiences ARO = How many times per year a threat occurs
15. What are the components (hierarchy) of the Cisco Self-Defending Network?
Security Device Manager provides GUI for configuring security features (e.g. IPS - IPSec site-site VPN - firewall features)
Module that goes in a Catalyst 6500 or similar to provide firewall services between VLANs.
An attempt to secure hardware - software - and various media while investigating anomalous network behavior.
16. What are the 4 Operations Security Recommendations
1. Separate duties (dual operator - two-man control) 2. Rotate duties (allows peer review) 3. System failure preparation (Trusted recovery) 4. Multiple personnel oversee configuration changes to anticipate issues
1. Relocating operations to another facility while the original facility is under repair 2. Using alternative forms of internal and external communication
Consists of a collection of security solutions to identify - prevent and adapt to emerging threats.
17. SDLC: Operations and Maintenance Phase
1. Non-disaster: Brief interruption 2. Disaster: Interruption 1-7 days 3. Catastrophe: Move to alternative site - all resources destroyed.
1. Configuration management and control 2. Continuous monitoring
Consists of a collection of security solutions to identify - prevent and adapt to emerging threats.
1. Relocating operations to another facility while the original facility is under repair 2. Using alternative forms of internal and external communication
18. What is the Cisco Security Manager?
1. Non-disaster: Brief interruption 2. Disaster: Interruption 1-7 days 3. Catastrophe: Move to alternative site - all resources destroyed.
An application used to configure security features on a variety of IOS-based routers - ASA 5500 - PIX 500 - IPS 4200 - Catalyst 6500 through a graphical interface. Also provides a centralized policy and inter-operates with Cisco ACS.
Qualitative mathematically models the probability and severity of a risk while Quantitative uses a scenario model (better for big deployments)
Security Device Manager provides GUI for configuring security features (e.g. IPS - IPSec site-site VPN - firewall features)
19. SDLC: Disposition
An application used to configure security features on a variety of IOS-based routers - ASA 5500 - PIX 500 - IPS 4200 - Catalyst 6500 through a graphical interface. Also provides a centralized policy and inter-operates with Cisco ACS.
1. Information preservation 2. Media sanitation 3. Hardware and software disposal
Qualitative mathematically models the probability and severity of a risk while Quantitative uses a scenario model (better for big deployments)
1. Hot site: completely redundant site 2. Warm site: similar - but outdated equipment 3. Cold site: network needs to be built from scratch
20. What are the 3 classifications of disruptions?
Consists of a collection of security solutions to identify - prevent and adapt to emerging threats.
1. Non-disaster: Brief interruption 2. Disaster: Interruption 1-7 days 3. Catastrophe: Move to alternative site - all resources destroyed.
Security Device Manager provides GUI for configuring security features (e.g. IPS - IPSec site-site VPN - firewall features)
Cisco 5500 Adaptive Security Appliances (ASA) offers a wide variety of security solutions such as firewall - IPS - VPN - anti-spyware - antivirus - and anti-phishing.
21. What is the ALE and how is it calculated?
Qualitative mathematically models the probability and severity of a risk while Quantitative uses a scenario model (better for big deployments)
1. Hot site: completely redundant site 2. Warm site: similar - but outdated equipment 3. Cold site: network needs to be built from scratch
Analyze inline traffic for malicious activity. IPS can drop offending traffic - instruct appliances to block specific host - send alerts etc.
ALE = Monetary value to justify expense of security solutions AV = total cost of an asset EF = % representing percentage of loss that an asset experiences ARO = How many times per year a threat occurs
22. Cisco Security Products: 4200 Series IPS
Analyze inline traffic for malicious activity. IPS can drop offending traffic - instruct appliances to block specific host - send alerts etc.
An attempt to secure hardware - software - and various media while investigating anomalous network behavior.
An application used to configure security features on a variety of IOS-based routers - ASA 5500 - PIX 500 - IPS 4200 - Catalyst 6500 through a graphical interface. Also provides a centralized policy and inter-operates with Cisco ACS.
Application that provides AAA funtionality
23. Cisco Security Products: Cisco Secure Access Control Server (ACS)
Application that provides AAA funtionality
1. Emergency Response 2. Recovery 3. Return to Normal Operations
Analyze inline traffic for malicious activity. IPS can drop offending traffic - instruct appliances to block specific host - send alerts etc.
Host-based Intrusion Prevention System (HIPS) - Example Cisco Security Agent
24. What are the 5 phases of the System Development Life Cycle (SDLC)?
1. Emergency Response 2. Recovery 3. Return to Normal Operations
1. Initiation 2. Acquisition and development 3. Implementation 4. Operations and maintenance 5. Disposition
An application used to configure security features on a variety of IOS-based routers - ASA 5500 - PIX 500 - IPS 4200 - Catalyst 6500 through a graphical interface. Also provides a centralized policy and inter-operates with Cisco ACS.
1. Information preservation 2. Media sanitation 3. Hardware and software disposal
25. What are two types of risk mitigation
Application that provides AAA funtionality
Integrated - Collaborative - Adaptive
Risk Management: keeping damange to a minimum - Risk Avoidance: preventing risk from occuring
1. Categorize severity of a security breach 2. Preliminary (high-level) risk assessment
26. What are two primary goals of business continuity planning?
An attempt to secure hardware - software - and various media while investigating anomalous network behavior.
1. Configuration management and control 2. Continuous monitoring
ALE = Monetary value to justify expense of security solutions AV = total cost of an asset EF = % representing percentage of loss that an asset experiences ARO = How many times per year a threat occurs
1. Relocating operations to another facility while the original facility is under repair 2. Using alternative forms of internal and external communication
27. What is the difference between a Qualitative analysis and a Quantitative Analysis
An attempt to secure hardware - software - and various media while investigating anomalous network behavior.
1. Initiation 2. Acquisition and development 3. Implementation 4. Operations and maintenance 5. Disposition
1. Separate duties (dual operator - two-man control) 2. Rotate duties (allows peer review) 3. System failure preparation (Trusted recovery) 4. Multiple personnel oversee configuration changes to anticipate issues
Qualitative mathematically models the probability and severity of a risk while Quantitative uses a scenario model (better for big deployments)
28. SDLC Acquisition and Development Phase
Many Cisco IOS routers can be configured with Intrusion Prevention System (IPS) - virtual private network (VPN) and firewall features.
1. Initiation 2. Acquisition and development 3. Implementation 4. Operations and maintenance 5. Disposition
Qualitative mathematically models the probability and severity of a risk while Quantitative uses a scenario model (better for big deployments)
1. Formalized risk assessment 2. Security functional requirements 3. Security assurance/legal requirements 4. Cost considerations 5. Security planning (security controls in use) 6. Design and development of security controls 7. Basic testing
29. What is the Cisco Self-Defending Network?
1. Categorize severity of a security breach 2. Preliminary (high-level) risk assessment
Qualitative mathematically models the probability and severity of a risk while Quantitative uses a scenario model (better for big deployments)
1. Formalized risk assessment 2. Security functional requirements 3. Security assurance/legal requirements 4. Cost considerations 5. Security planning (security controls in use) 6. Design and development of security controls 7. Basic testing
Consists of a collection of security solutions to identify - prevent and adapt to emerging threats.
30. Cisco Security Products: Firewall Services Module (FWSM)
Analyze inline traffic for malicious activity. IPS can drop offending traffic - instruct appliances to block specific host - send alerts etc.
Module that goes in a Catalyst 6500 or similar to provide firewall services between VLANs.
1. Configuration management and control 2. Continuous monitoring
1. Information preservation 2. Media sanitation 3. Hardware and software disposal