1. A network security manager has been tasked with supporting some staff to work from home on a part time basis. What Cisco Secure access product will allow this manager to provide secure, manageable voice and video services to this group of personnel?
Cisco Secure Access Control System
Cisco NAC Appliance
Cisco Virtual Office*
Cisco Identity Services Engine
2. Which two security features must be implemented when SCP is a part of a company security plan? (Choose two.)
encrypted Cisco IOS File System
3. What are two attributes of a qualitative risk analysis? (Choose two.) It is measurable.
It assigns values to assets.
It is exploratory.*
It is descriptive.*
It uses a mathematical model.
4. Why would an organization perform a quantitative risk analysis for network security threats?
so that management can determine the number of network devices needed to inspect, analyze, and protect the corporate resources
so that management has documentation about the number of security attacks that have occurred within a particular time period
so that the organization can focus resources where they are most needed*
so that the organization knows the top areas where network security holes exist
5. What is the purpose of the Tripwire network testing tool?
to perform vulnerability scanning
to assess configuration against established policies, recommended best practices, and compliance standards*
to detect unauthorized wired network access
to provide password auditing and recovery
to provide information about vulnerabilities and aid in penetration testing and IDS signature development
6. A network manager has presented to upper management that the threat of fire in the data center has an exposure factor of 70 percent. What does this mean?
70 percent of the devices in the data center do not have fire resistance coverage.
70 percent of the data center area has a high risk of fire.
There is a 70 percent chance of a fire in the data center.
70 percent of all data center equipment would be destroyed if there were a fire.*
7. What operations security principle is intended to ensure that a single individual does not control two or more phases of an operation?
separation of duties*
rotation of duties
8. Which security test is appropriate for detecting system weaknesses such as misconfiguration, default passwords, and potential DoS targets?
9. What situations are addressed by a business continuity plan?
the continued operations of an organization in the event of a disaster or service interruption*
the roles and responsibilities of personnel responding to security breaches
the threats that corporate systems are subjected to in a particular environment
the day-to-day operations necessary to deploy and maintain secure systems
10. What is the main purpose of the Cisco SIO?
to guarantee every connection coming on or off the endpoint
to provide a method of introducing scanning elements into the network
to enable a single point of policy definition that spans multiple enforcement points
to identify malicious traffic and develop rules to stop it*
11. Fill in the blank. risk analysis is used to estimate the probability and severity of threats to a system.
12. How does network scanning help assess operations security?
It can simulate attacks from malicious sources.
It can log abnormal activity.
It can detect open TCP ports on network systems.*
It can detect weak or blank passwords.
13. In quantitative risk analysis, what term is used to represent the degree of destruction that would occur if an event took place?
single loss expectancy
annualized loss expectancy
annualized rate of occurrence
14. What security task is relevant in the disposition phase of the SDLC?
defining the levels of potential impact on an organization from a security breach
identifying the protection requirements for systems through a formal risk assessment process
ensuring that security plans are designed, developed, and implemented
ensuring that data is deleted, erased, or overwritten*
15. What should be the primary objective of a contingency and disaster recovery plan?
eliminate risk by avoiding threats to the network altogether
identify acceptable methods of recovery on events most likely to happen*
address every possible disaster scenario and assumption
implement protection mechanisms in an attempt to reduce risks to acceptable levels
16. Using quantitative risk analysis, what is the annualized loss expectancy to an organization of an event that has single loss expectancy of $500,000 and a annualized rate of occurrence of .03?
17. What component of the Cisco SecureX architecture automatically deploys security rules to Cisco devices?
policy management console
18. Which security policy component defines what users are allowed and not allowed to do on company systems?
acceptable use policy*
19. A new network manager at a small company is presented with a list from the technician who is responsible for server backups. The technician provides the following list of current practices.
Blank media is always used.
Server backups are performed on a weekly basis.
Only three people (the technician, a peer, and the supervisor of the technician) have rights to perform the backups.
The technician stores the backups in a fire-proof safe in the wiring closet.
Twice a month, the technician and supervisor take a separate backup copy to a secure off-site location.
Which practice would it be best to modify in order to improve this process so it is in accordance with recommended best practices for a secure backup program?
More people should have rights to perform the backups.
Only one person is needed to store the off-site copy.
Two people should securely store the on-site backup media.*
Media can be rotated.
Backups should be done on a more frequent basis.
20. A new person has joined the security operations team for a manufacturing plant. What is a common scope of responsibility for this person?
physical and logical security of all business personnel
managing redundancy operations for all systems
day-to-day maintenance of network security*
data security on host devices
21. What is the objective of the governing policy in the security policy hierarchy structure?
It defines system and issue-specific policies that describe what the technical staff does.
It outlines the company’s overall security goals for managers and technical staff.*
It covers all rules pertaining to information security that end users should know about and follow.
It provides general policies on how the technical staff should perform security functions.
22. Which type of security policy document is it that includes implementation details that usually contain step-by-step instructions and graphics?
best practices document
23. What are the three security tasks related to the disposition phase of the system development life cycle? (Choose three.)
preliminary risk assessment
hardware and software disposal*
security cost considerations
24. What is the purpose of a security awareness campaign?
to integrate all the security skills and competencies into a single body of knowledge
to teach skills so employees can perform security tasks
to focus the attention of employees on security issues*
to provide users with a training curriculum that can ultimately lead to a formal degree
Place the options in the following order:
applies policy-based access control
enforces security policies by updating noncompliant machines
provides access in accordance with rule-based policies
delivers network services to remote employees