CCNP Secure FAQ Network Security Threats
Q1. A good rule of thumb for “strong” passwords is that they follow which of the following guidelines?
A. Should be uppercase and lowercase, numbers, and special characters
B. Should be complex and documented someplace
C. Should be common words all strung together
D. Should be documented so that you can reference them
E. All of these answers are correct.
Q2. Which of the following are the main reasons why security attacks occur?
A. Lack of effective network security policy
B. Insecure physical premises
C. Network configuration weaknesses
D. Technology weaknesses
E. Improperly documented changes
Q3. Which of the following are the main categories of threats?
A. Categorized
B. Structured
C. Open
D. Closed
E. Unstructured
F. Uncategorized
Q4. Which of the following are major network attack types?
A. Reconnaissance
B. Access
C. Distributed
D. Aggressive
E. DoS
Q5. Which of the following are considered to be intruders on a computer system?
A. Crackers
B. Hackers
C. Phreakers
D. Script kiddies
E. All of these answers are correct.
Q6. An intruder who enjoys the challenge of being able to bypass security measures is considered intruding for which of the following reasons?
A. Curiosity
B. Fun and pride
C. Revenge
D. Profit
E. Political purpose
F. None of these answers are correct.
Q7. Which of the following areas of the network are the most susceptible to configuration errors affecting security?
A. Firewall settings
B. DHCP settings
C. SNMP settings
D. IPS/IDS rules
E. IP assignment settings
Q8. Which of the following are methods for performing a fabrication access attack? (Select all that apply)?
A. Virus
B. DoS
C. Worm
D. Spoofing
E. Trojan horses
Q9. Politics within an organization can cause a lack of _____ within the security policies.
Q10. A good disaster recovery plan must include contingencies for both _____ and _____ security breaches.
Q11. Unauthorized network access is made easier when _____ are implemented on the network.
Q12. _____ are individuals who have extensive knowledge of telephone networks and switching equipment.
Q13. Hackers with malicious intent are referred to as _____.
Q14. _____ scans scan the service ports of a single host and request different services at each port.
Q15. The most effective way to protect your sensitive data is to save it in an _____ format or to send it through an _____ connection.
Q16. The five core reasons for intruding on a system or network include _____.
More Resources