CCNA Security - Chapter 10

Is this your test? Login to manage it. If not, you can create an assessment just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
In quantitative risk analysis, what term is used to represent the degree of destruction that would occur if an event took place?
2.
1 point
What security task is relevant in the disposition phase of the SDLC?
3.
1 point
Which two security features must be implemented when SCP is a part of a company security plan? (Choose two.)
4.
1 point
What situations are addressed by a business continuity plan?
5.
1 point
What component of the Cisco SecureX architecture automatically deploys security rules to Cisco devices?
6.
1 point
Using quantitative risk analysis, what is the annualized loss expectancy to an organization of an event that has single loss expectancy of $500,000 and a annualized rate of occurrence of .03?
7.
1 point
What is the purpose of a security awareness campaign?
8.
1 point
What is the main purpose of the Cisco SIO?
9.
1 point
Which practice would it be best to modify in order to improve this process so it is in accordance with recommended best practices for a secure backup program?
10.
1 point
A network manager has presented to upper management that the threat of fire in the data center has an exposure factor of 70 percent. What does this mean?
11.
1 point
A new person has joined the security operations team for a manufacturing plant. What is a common scope of responsibility for this person?
12.
1 point
Why would an organization perform a quantitative risk analysis for network security threats?
13.
1 point
What is the objective of the governing policy in the security policy hierarchy structure?
14.
1 point
What are two attributes of a qualitative risk analysis? (Choose two.) It is measurable.
15.
1 point
What is the purpose of the Tripwire network testing tool?
16.
1 point
_____ analysis is used to estimate the probability and severity of threats to a system
17.
1 point
Which type of security policy document is it that includes implementation details that usually contain step-by-step instructions and graphics?
18.
1 point
What are the three security tasks related to the disposition phase of the system development life cycle? (Choose three.)
19.
1 point
How does network scanning help assess operations security?
20.
1 point
What operations security principle is intended to ensure that a single individual does not control two or more phases of an operation?
21.
1 point
Which security test is appropriate for detecting system weaknesses such as misconfiguration, default passwords, and potential DoS targets?
22.
1 point
Which security policy component defines what users are allowed and not allowed to do on company systems?
23.
1 point
A network security manager has been tasked with supporting some staff to work from home on a part time basis. What Cisco Secure access product will allow this manager to provide secure, manageable voice and video services to this group of personnel?
24.
1 point
What should be the primary objective of a contingency and disaster recovery plan?