CCNA Security FAQ: Network Insecurity
Q1. Which of the following constitutes the elements in the C-I-A triad?
A. Consolidation, Integration, Authentication
B. Confidentiality, Integrity, Availability
C. Confusion, Impact, Animosity
D. Central, Intelligence, Agency
E. None of the above.
Q2. Cisco says that there are two major categories of threats to network security. Pick
them from the following list:
A. External threats
B. Viruses
C. Social engineering
D. Internal threats
E. Unauthorized access
F. Network misuse
Q3. Which of the following is the best definition for integrity safeguards? (Choose one):
A. Ensuring that only authorized users have access to sensitive data.
B. Ensuring that only authorized entities can change sensitive data.
C. Ensuring that systems and the data that they provide access to remain available for authorized users.
D. Ensuring that only legitimate users can access the network subject to time of day (ToD) controls.
E. Configuring access control lists (ACLs), such that only specified protocols are allowed through the perimeter.
Q4. Match the following data classification levels for the public sector with their definitions:
- Unclassified: _____
- Secret: _____
- Confidential: _____
- Sensitive but Unclassified (SBU): _____
- Top Secret: _____
Definitions:
A. Data with minimum confidentiality, integrity, or availability requirements; thus, little effort is made to secure it.
B. Data that would cause some embarrassment if revealed, but not enough to constitute a security breach.
C. First level of classified data. This data must comply with confidentiality requirements.
D. Data that requires concerted effort to keep secure. Typically, only a limited number of people are authorized to access this data, certainly fewer than those who are authorized to access confidential data.
E. The greatest effort is used to secure this data and to ensure its secrecy. Only those people with a “need to know” typically have access to data classified at this level
The answers are::
- Unclassified: A
- Secret: D
- Confidential: C
- Sensitive but Unclassified (SBU): B
- Top Secret: E
Q5. Which of the following are not considered categories of security controls? (Choose all
that apply.)
A. Preventative control
B. Physical control
C. Deterrent control
D. Administrative control
E. Technical control
F. Detective control
Q6. Match the three types of laws found in most countries with their definitions:
Answer: Types of Law:
- Civil: _____
- Criminal: _____
- Administrative: _____
Definitions:
A. Concerned with crimes. Penalties usually involve possible fines (paid to the court) and/or imprisonment of the offender.
B. Concerned with righting wrongs that do not involve crimes or criminal intent.Penalties are typically monetary and paid to the party who wins the lawsuit.
C. Typically government agencies in the course of enforcing regulations.Monetary awards are divided between the government agency and the victim (if any) of the contravened regulation.
The correct answers are:
- Civil: B
- Criminal (also called “tort”): A
- Administrative: C
Q7. True or false: An exploit is the likelihood that a vulnerability might be exploited by aspecific attack
that for a “risk.”
Q8. Put the following seven steps for compromising targets and applications in the correct order:
A. Install back doors.
B. Escalate privileges.
C. Perform footprint analysis.
D. Manipulate users to gain access.
E. Enumerate applications and operating systems.
F. Gather additional passwords and secrets.
G. Leverage the compromised system
Answer: The correct order is C, E, D, B, F, A, G. In other words:
- Perform footprint analysis (reconnaissance).
- Enumerate applications and operating systems.
- Manipulate users to gain access.
- Escalate privileges.
- Gather additional passwords and secrets.
- Install back doors.
- Leverage the compromised system.
Q9. Fill in the blank for the following definition with the letter corresponding to the correct answer below:
If an attacker were simply guessing at sequence numbers—essentially using tools to calculate them—then the attack would be called _________ spoofing. Physical access to your network is not required.Choices:
A. Statistical
B. Invasive
C. Blind
D. Nonblind
E. Stochastic
Q10. True or false: Man-in-the-Middle (MiM) attacks attack a network or system’s availability.
Q11. Which of the following strategies help mitigate against trust exploits?
A. Installing a firewall or IPS that can examine inbound traffic to ensure that it is protocol compliant, block traffic that isn’t, and also alert a custodian.
B. Installing Host Intrusion Protection System (HIPS) software on inside hosts.
C. Using ACLs on an IOS firewall.
D. All of the above.