CCNA Security - Chapter 9

Is this your test? Login to manage it. If not, you can develop a test just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
In the Cisco SecureX architecture, which component is considered the workhorse of policy enforcement?
2.
1 point
Which aspect of a scanning element is able to determine a security policy to apply based on information such as the person using the device, the location of the device, and the application being used?
3.
1 point
What are the two components in the Cisco Security Management Suite? (Choose two.)
4.
1 point
Which network security test requires a network administrator to launch an attack within the network?
5.
1 point
Which Cisco secure access solution can be used to determine if hosts are compliant with security policies?
6.
1 point
If a web browser is to be used, and not a hardware or software-based client, which Cisco solution is best for establishing a secure VPN connection?
7.
1 point
Which development has contributed most to the growing demand for a borderless network?
8.
1 point
Which security document includes implementation details, usually with step-by-step instructions and graphics?
9.
1 point
Which SecureX product family would include Cisco AnyConnect?
10.
1 point
In which phase of the system development life cycle should security requirements be addressed?
11.
1 point
What are the two major components of a security awareness program? (Choose two.)
12.
1 point
What is the purpose of the webtype ACLs in an ASA?
13.
1 point
What are the two major elements of the Cisco Secure Communications solution? (Choose two.)
14.
1 point
Refer to the exhibit. When implementing the Cisco Self-Defending Network, which two technologies ensure confidentiality when referring to secure communications? (Choose two.)
15.
1 point
Which two Cisco Threat Control and Containment technologies address endpoint security? (Choose two.)
16.
1 point
Which three types of remote access VPNs are supported on ASA devices?
17.
1 point
Which statement could be expected to be included in a Code of Ethics that is related to IT and network security?
18.
1 point
What command defines a DHCP pool that uses the maximum number of DHCP client addresses available on an ASA 5505 that is using the Base license?
19.
1 point
Which statement describes the function provided to a network administrator who uses the Cisco Adaptive Security Device Manager (ASDM) GUI that runs as a Java Web Start application?
20.
1 point
What protocol is used by SCP for secure transport?
21.
1 point
Which principle of the Cisco Self-Defending Network emphasizes that security should be built in?
22.
1 point
What is a characteristic of ASA security levels?​
23.
1 point
A company is considering implementing the Cisco SecureX security architecture. What is the purpose of Cisco TrustSec?
24.
1 point
Refer to the exhibit. Two types of VLAN interfaces were configured on an ASA 5505 with a Base license. The administrator wants to configure a third VLAN interface with limited functionality. Which action should be taken by the administrator to configure the third interface?
25.
1 point
Which term describes a completely redundant backup facility, with almost identical equipment to the operational facility, that is maintained in the event of a disaster?
26.
1 point
Which statement about network security within the SecureX architecture is true?
27.
1 point
Which Cisco VPN solution provides limited access to internal network resources by utilizing a Cisco ASA and provides browser-based access only?
28.
1 point
Which three detailed documents are used by security staff for an organization to implement the security policies? (Choose three.)
29.
1 point
When an organization implements the two-person control principle, how are tasks handled?
30.
1 point
Which option describes ethics?
31.
1 point
What are three key principles of a Cisco Self-Defending Network? (Choose three.)
32.
1 point
Which security services, available through the Cisco Self-Defending Network, include VPN access?
33.
1 point
Which three documents comprise the hierarchical structure of a comprehensive security policy for an organization? (Choose three.)
34.
1 point
What is the primary focus of network operations security?
35.
1 point
Which Cisco SecureX product family would be primarily responsible for detecting and blocking attacks and exploits, while preventing intruder access?
36.
1 point
Refer to the exhibit. A network administrator is configuring PAT on an ASA device to enable internal workstations to access the Internet. Which configuration command should be used next?
37.
1 point
Refer to the exhibit. A network administrator is configuring an object group on an ASA device. Which configuration keyword should be used after the object group nameSERVICE1?
38.
1 point
What three areas should be considered when designing a network security policy? (Choose three.)
39.
1 point
What is a feature of an effective network security training program?
40.
1 point
Which type of analysis uses a mathematical model that assigns a monetary figure to the value of assets, the cost of threats being realized, and the cost of security implementations?
41.
1 point
Which two statements are true about ASA standard ACLs? (Choose two.)​
42.
1 point
Which three statements describe ethics in network security? (Choose three.)
43.
1 point
What is a design feature of a secure network life cycle management process?
44.
1 point
A network engineer is using a Cisco ASA as a proxy device to provide remote secure access to a company web server. What technology is being used?
45.
1 point
Which component of the security policy lists specific websites, newsgroups, or bandwidth-intensive applications that are not allowed on the company network?