Config Router

  • Google Sheets
  • CCNA Online training
    • CCNA
  • CISCO Lab Guides
    • CCNA Security Lab Manual With Solutions
    • CCNP Route Lab Manual with Solutions
    • CCNP Switch Lab Manual with Solutions
  • Juniper
  • Linux
  • DevOps Tutorials
  • Python Array
You are here: Home / Cisco / CCNP Secure FAQ Network Security Threats

CCNP Secure FAQ Network Security Threats

March 2, 2020 by Scott

CCNP Secure FAQ Network Security Threats

Q1. A good rule of thumb for “strong” passwords is that they follow which of the following guidelines?
A. Should be uppercase and lowercase, numbers, and special characters
B. Should be complex and documented someplace
C. Should be common words all strung together
D. Should be documented so that you can reference them
E. All of these answers are correct.

Answer: A

Q2. Which of the following are the main reasons why security attacks occur?
A. Lack of effective network security policy
B. Insecure physical premises
C. Network configuration weaknesses
D. Technology weaknesses
E. Improperly documented changes

Answer: A, C, and D

Q3. Which of the following are the main categories of threats?
A. Categorized
B. Structured
C. Open
D. Closed
E. Unstructured
F. Uncategorized

Answer: B and E

Q4. Which of the following are major network attack types?
A. Reconnaissance
B. Access
C. Distributed
D. Aggressive
E. DoS

Answer: A, B, and E

Q5. Which of the following are considered to be intruders on a computer system?
A. Crackers
B. Hackers
C. Phreakers
D. Script kiddies
E. All of these answers are correct.

Answer: E

Q6. An intruder who enjoys the challenge of being able to bypass security measures is considered intruding for which of the following reasons?
A. Curiosity
B. Fun and pride
C. Revenge
D. Profit
E. Political purpose
F. None of these answers are correct.

Answer: B

Q7. Which of the following areas of the network are the most susceptible to configuration errors affecting security?
A. Firewall settings
B. DHCP settings
C. SNMP settings
D. IPS/IDS rules
E. IP assignment settings

Answer: A, C, and D

Q8. Which of the following are methods for performing a fabrication access attack? (Select all that apply)?
A. Virus
B. DoS
C. Worm
D. Spoofing
E. Trojan horses

Answer: A, C, and E

Q9. Politics within an organization can cause a lack of _____ within the security policies.

Answer: consistency

Q10. A good disaster recovery plan must include contingencies for both _____ and _____ security breaches.

Answer: physical,virtual

Q11. Unauthorized network access is made easier when _____ are implemented on the network.

Answer: poorly designed access controls

Q12. _____ are individuals who have extensive knowledge of telephone networks and switching equipment.

Answer: Phreakers

Q13. Hackers with malicious intent are referred to as _____.

Answer: black hats.

Q14. _____ scans scan the service ports of a single host and request different services at each port.

Answer: Vertical

Q15. The most effective way to protect your sensitive data is to save it in an _____ format or to send it through an _____ connection.

Answer: encrypted, encrypted

Q16. The five core reasons for intruding on a system or network include _____.

Answer: curiosity, fun and pride, revenge, profit, and political purposes.

More Resources

  • CCNP Secure FAQ
  • CCNP Secure IPS FAQ
  • CCNP Route Notes
  • CCNP Route Lab Manual with Solutions
  • CCNP Security VPN FAQ
  • CCNP Switch FAQ
  • CCNP Switch Lab Manual with Solutions

Related

Filed Under: Cisco Tagged With: CCNP Secure FAQ, Network Security Threats

Recent Posts

  • How do I give user access to Jenkins?
  • What is docker volume command?
  • What is the date format in Unix?
  • What is the difference between ARG and ENV Docker?
  • What is rsync command Linux?
  • How to Add Music to Snapchat 2021 Android? | How to Search, Add, Share Songs on Snapchat Story?
  • How to Enable Snapchat Notifications for Android & iPhone? | Steps to Turn on Snapchat Bitmoji Notification
  • Easy Methods to Fix Snapchat Camera Not Working Black Screen Issue | Reasons & Troubleshooting Tips to Solve Snapchat Camera Problems
  • Detailed Procedure for How to Update Snapchat on iOS 14 for Free
  • What is Snapchat Spotlight Feature? How to Make a Spotlight on Snapchat?
  • Snapchat Hack Tutorial 2021: Can I hack a Snapchat Account without them knowing?

Copyright © 2025 · News Pro Theme on Genesis Framework · WordPress · Log in