CCNP Security FAQ : Network Security
Q1. Which single method is the best way to secure a network?
A. Allow dialup access only to the Internet
B. Install a personal firewall on every workstation
C. Use very complex passwords
D. Implement strong perimeter security
E. None of the above
Q2. What are the three types of cyber attacks? (Choose three.)
A. Penetration attack
B. Access attack
C. Denial of service attack
D. Destruction of data attack
E. Reconnaissance attack
Q3. What type of threat is directed toward a specific target normally for a specific purpose?
A. Structured threats
B. Directed threats
C. Unstructured threats
D. Political threats
E. None of the above
Q4. What type of threat normally scans networks looking for “targets of opportunity?”
A. Structured threats
B. Scanning threats
C. Unstructured threats
D. Script kiddies
E. None of the above
Q5. What type of scan looks for all services running on a single host?
A. Ping sweep
B. Service scan
C. Horizontal scan
D. Vertical scan
E. All of the above
Q6. What type of attack determines the address space assigned to an organization?
A. Ping sweep
B. DNS queries
C. Vertical scan
D. Horizontal scan
E. None of the above
Q7. What are the steps of the security process?
A. Secure, test, repair, retest
B. Test, repair, monitor, evaluate
C. Lather, rinse, repeat
D. Evaluate, secure, test
E. None of the above
Q8. What constant action sits between the individual steps of the security process?
A. Test
B. Retest
C. Evaluate
D. Repair
E. Improve
Q9. True or false: Cisco AVVID uses only Cisco products.
Q10. Which of the following is not a component of Cisco SAFE?
A. Perimeter security
B. Policy implementation
C. Identity
D. Security management and monitoring
E. Application security
Q11. What is the difference between the network security policy and the network security process?
Q12. For unstructured threats, what is the normal anatomy of an attack?
Q13. What information can you gain from a ping sweep?
Q14. What is the single most important component when implementing defense in depth?
Q15. Why could an organization be legally responsible if its systems are compromised during an attack?
More Resources