CCNP Secure FAQ Network Security Threats


CCNP Secure FAQ Network Security Threats

Q1. A good rule of thumb for “strong” passwords is that they follow which of the following guidelines?
A. Should be uppercase and lowercase, numbers, and special characters
B. Should be complex and documented someplace
C. Should be common words all strung together
D. Should be documented so that you can reference them
E. All of these answers are correct.

Answer: A

Q2. Which of the following are the main reasons why security attacks occur?
A. Lack of effective network security policy
B. Insecure physical premises
C. Network configuration weaknesses
D. Technology weaknesses
E. Improperly documented changes

Answer: A, C, and D

Q3. Which of the following are the main categories of threats?
A. Categorized
B. Structured
C. Open
D. Closed
E. Unstructured
F. Uncategorized

Answer: B and E

Q4. Which of the following are major network attack types?
A. Reconnaissance
B. Access
C. Distributed
D. Aggressive
E. DoS

Answer: A, B, and E

Q5. Which of the following are considered to be intruders on a computer system?
A. Crackers
B. Hackers
C. Phreakers
D. Script kiddies
E. All of these answers are correct.

Answer: E

Q6. An intruder who enjoys the challenge of being able to bypass security measures is considered intruding for which of the following reasons?
A. Curiosity
B. Fun and pride
C. Revenge
D. Profit
E. Political purpose
F. None of these answers are correct.

Answer: B

Q7. Which of the following areas of the network are the most susceptible to configuration errors affecting security?
A. Firewall settings
B. DHCP settings
C. SNMP settings
D. IPS/IDS rules
E. IP assignment settings

Answer: A, C, and D

Q8. Which of the following are methods for performing a fabrication access attack? (Select all that apply)?
A. Virus
B. DoS
C. Worm
D. Spoofing
E. Trojan horses

Answer: A, C, and E

Q9. Politics within an organization can cause a lack of _____ within the security policies.

Answer: consistency

Q10. A good disaster recovery plan must include contingencies for both _____ and _____ security breaches.

Answer: physical,virtual

Q11. Unauthorized network access is made easier when _____ are implemented on the network.

Answer: poorly designed access controls

Q12. _____ are individuals who have extensive knowledge of telephone networks and switching equipment.

Answer: Phreakers

Q13. Hackers with malicious intent are referred to as _____.

Answer: black hats.

Q14. _____ scans scan the service ports of a single host and request different services at each port.

Answer: Vertical

Q15. The most effective way to protect your sensitive data is to save it in an _____ format or to send it through an _____ connection.

Answer: encrypted, encrypted

Q16. The five core reasons for intruding on a system or network include _____.

Answer: curiosity, fun and pride, revenge, profit, and political purposes.

More Resources

About the author


Leave a Comment