Chapter 10 - CCNAS

Is this your test? Login to manage it. If not, you can create an assessment just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
In quantitative risk analysis, what term is used to represent the degree of destruction that would occur if an event took place?
2.
1 point
What security task is relevant in the disposition phase of the SDLC?
3.
1 point
Which two security features must be implemented when SCP is a part of a company security plan? (Choose two.)
4.
1 point
What situations are addressed by a business continuity plan?
5.
1 point
What component of the Cisco SecureX architecture automatically deploys security rules to Cisco devices?
6.
1 point
Using quantitative risk analysis, what is the annualized loss expectancy to an organization of an event that has single loss expectancy of $500,000 and a annualized rate of occurrence of .03?
7.
1 point
The following order:
applies policy-based access control
enforces security policies by updating noncompliant machines
provides access in accordance with rule-based policies
delivers network services to remote employees
8.
1 point
What is the main purpose of the Cisco SIO?
9.
1 point
A new person has joined the security operations team for a manufacturing plant. What is a common scope of responsibility for this person?
10.
1 point
How does network scanning help assess operations security?
11.
1 point
Which security policy component defines what users are allowed and not allowed to do on company systems?
12.
1 point
Why would an organization perform a quantitative risk analysis for network security threats?
13.
1 point
Which type of security policy document is it that includes implementation details that usually contain step-by-step instructions and graphics?
14.
1 point
What are two attributes of a qualitative risk analysis? (Choose two.) It is measurable.
15.
1 point
What is the purpose of the Tripwire network testing tool?
16.
1 point
What is the objective of the governing policy in the security policy hierarchy structure?
17.
1 point
What are the three security tasks related to the disposition phase of the system development life cycle? (Choose three.)
18.
1 point
Fill in the blank. ____ analysis is used to estimate the probability and severity of threats to a system.
19.
1 point
Which security test is appropriate for detecting system weaknesses such as misconfiguration, default passwords, and potential DoS targets?
20.
1 point
A network manager has presented to upper management that the threat of fire in the data center has an exposure factor of 70 percent. What does this mean?
21.
1 point
What operations security principle is intended to ensure that a single individual does not control two or more phases of an operation?
22.
1 point
A new network manager at a small company is presented with a list from the technician who is responsible for server backups. The technician provides the following list of current practices.
23.
1 point
What is the purpose of a security awareness campaign?
24.
1 point
A network security manager has been tasked with supporting some staff to work from home on a part time basis. What Cisco Secure access product will allow this manager to provide secure, manageable voice and video services to this group of personnel?
25.
1 point
What should be the primary objective of a contingency and disaster recovery plan?