CCNA Security Chapter 11

Is this your test? Login to manage it. If not, you can develop an exam just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
What step should be taken after data is collected, but before equipment is disconnected, if a security breach is found on a system?
2.
1 point
Which security program is aimed at all levels of an organization, including end users and executive staff?
3.
1 point
How does network scanning help assess operations security?
4.
1 point
What network testing tool can be used to identify network layer protocols running on a host?
5.
1 point
Which type of documents include implementation details that usually contain step-by-step instructions and graphics?
6.
1 point
What are two major components of a security awareness program? (Choose two.)

7.
1 point
Match the network security testing tool with the correct function. (Not all options are used.)
8.
1 point
What type of network security test would be used by network administrators for detection and reporting of changes to network systems?
9.
1 point
Which policy outlines the overall security goals for managers and technical staff within a company?
10.
1 point
What is the goal of network penetration testing?
11.
1 point
Which type of security policy includes network access standards and server security policies?
12.
1 point
Which type of security policy document is it that includes implementation details that usually contain step-by-step instructions and graphics?
13.
1 point
Which type of security policy includes acceptable encryption methods?
14.
1 point
What is the objective of the governing policy in the security policy hierarchy structure?
15.
1 point
What is the purpose of a security awareness campaign?
16.
1 point
What testing tool is available for network administrators who need a GUI version of Nmap?
17.
1 point
What is the determining factor in the content of a security policy within an organization?
18.
1 point
Which executive position is ultimately responsible for the success of an organization?
19.
1 point
Which initial step should be followed when a security breach is found on a corporate system?
20.
1 point
What network security testing tool has the ability to provide details on the source of suspicious network activity?
21.
1 point
What network scanning tool has advanced features that allows it to use decoy hosts to mask the source of the scan?
22.
1 point
Which type of documents help an organization establish consistency in the operations of the network by specifying criteria that must be followed?
23.
1 point
Which security test is appropriate for detecting system weaknesses such as misconfiguration, default passwords, and potential DoS targets?
24.
1 point
What is implemented by administration to instruct end users in how to effectively conduct business safely within an organization?