Config Router

  • Google Sheets
  • CCNA Online training
    • CCNA
  • CISCO Lab Guides
    • CCNA Security Lab Manual With Solutions
    • CCNP Route Lab Manual with Solutions
    • CCNP Switch Lab Manual with Solutions
  • Juniper
  • Linux
  • DevOps Tutorials
  • Python Array
You are here: Home / Cisco / CCNA Security FAQ: Developing a Secure Network

CCNA Security FAQ: Developing a Secure Network

March 12, 2020 by Scott

CCNA Security FAQ: Developing a Secure Network

Question. What are the five phases of the System Development Life Cycle (SDLC)? (Choose five.)
A. Termination
B. Operations and maintenance
C. Acquisition and development
D. Initiation
E. Implementation
F. Execution
G. Disposition

Answer: B, C, D, E, and G

Question. Which of the following attempts to ensure that no one employee becomes a pervasive security threat, that data can be recovered from backups, and that information system changes do not compromise a system’s security?
A. Strategic security planning
B. Implementation security
C. Disaster recovery
D. Operations security

Answer: D

Question. Which three of the following are network evaluation techniques? (Choose three.)
A. Using Cisco SDM to perform a network posture validation

B. Scanning a network for active IP addresses and open ports on those IP addresses

C. Performing end-user training on the use of antispyware software

D. Using password-cracking utilities

E. Performing virus scans

Answer: B, D, and E

Question. What are three phases of disaster recovery? (Choose three.)
A. Emergency response phase
B. Return to normal operations phase
C. Threat isolation phase
D. Recovery phase

Answer: A, B, and D

Question. Which of the following is a continually changing document that dictates a set of guidelines for network use?
A. Security policy
B. Best-practice recommendations
C. Identity-based networking policy
D. Acceptable-use executive summary

Answer: A
Security Policy
2-1

Question. Which security policy component contains mandatory practices (as opposed to recommendations or step-by-step instructions)?
A. Guidelines
B. Standards
C. Procedures
D. Tenets

Answer: B

Question. Which three individuals are the most likely to be intimately involved with the creation of a security policy? (Choose three.)
A. Chief Security Officer (CSO)
B. Chief Executive Officer (CEO)
C. Chief Information Officer (CIO)
D. Chief Information Security Officer (CISO)

Answer: A, C, and D

Question. The following formula can be used to calculate annualized loss expectancy:
ALE = AV * EF * ARO
Which component of the formula represents the percentage of loss of an asset that is experienced if an anticipated threat occurs?
A. ALE
B. AV
C. EF
D. ARO

Answer: C

Question. All of the following are common elements of a network design. Which one is the most important?
A. Business needs
B. Risk analysis
C. Security policy
D. Best practices
E. Security operations
F. They are all equally important.

Answer: A

Question. Which of the following makes the end-user community conscious of security issues without necessarily giving any in-depth procedural instruction?
A. Education
B. Training
C. Awareness
D. Remediation

Answer: C

Question. What type of threat combines worm, virus, and Trojan horse characteristics?
A. Heuristic threat
B. Blended threat
C. Morphing threat
D. Integrated threat

Answer: B

Question. What are the three core characteristics of a Cisco Self-Defending Network? (Choose three.)
A. Integrated
B. Collaborative
C. Autonomous
D. Adaptive

Answer: A, B, and D

Question. Which of the following offers a variety of security solutions, including firewall, IPS, VPN, antispyware, antivirus, and antiphishing features?
A. Cisco IOS router
B. Cisco ASA 5500 series security appliance
C. Cisco PIX 500 series security appliance
D. Cisco 4200 series IPS appliance

Answer: B

Related

Filed Under: Cisco Tagged With: CCNA Security FAQ, Developing a Secure Network

Recent Posts

  • How do I give user access to Jenkins?
  • What is docker volume command?
  • What is the date format in Unix?
  • What is the difference between ARG and ENV Docker?
  • What is rsync command Linux?
  • How to Add Music to Snapchat 2021 Android? | How to Search, Add, Share Songs on Snapchat Story?
  • How to Enable Snapchat Notifications for Android & iPhone? | Steps to Turn on Snapchat Bitmoji Notification
  • Easy Methods to Fix Snapchat Camera Not Working Black Screen Issue | Reasons & Troubleshooting Tips to Solve Snapchat Camera Problems
  • Detailed Procedure for How to Update Snapchat on iOS 14 for Free
  • What is Snapchat Spotlight Feature? How to Make a Spotlight on Snapchat?
  • Snapchat Hack Tutorial 2021: Can I hack a Snapchat Account without them knowing?

Copyright © 2025 · News Pro Theme on Genesis Framework · WordPress · Log in