Last Updated on November 1, 2019 by Admin
Implementing Network Security ( Version 2.0) – CCNAS Chapter 11 Exam Online
CCNAS – Chapter 11 Exam
Quiz-summary
0 of 24 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
Information
CCNAS – Chapter 11 Exam
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 24 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- Answered
- Review
-
Question 1 of 24
1. Question
1 pointsWhich security test is appropriate for detecting system weaknesses such as misconfiguration, default passwords, and potential DoS targets?
Correct
Incorrect
There are many tests used to assess the operational status of networks and systems. Weaknesses in systems such as blank or default passwords, or misconfigurations that would make a system a target of a DoS attack can be detected through vulnerability scanning.
Hint
There are many tests used to assess the operational status of networks and systems. Weaknesses in systems such as blank or default passwords, or misconfigurations that would make a system a target of a DoS attack can be detected through vulnerability scanning.
-
Question 2 of 24
2. Question
1 pointsHow does network scanning help assess operations security?
Correct
Incorrect
Network scanning can help a network administrator strengthen the security of the network and systems by identifying open TCP and UDP ports that could be targets of an attack.
Hint
Network scanning can help a network administrator strengthen the security of the network and systems by identifying open TCP and UDP ports that could be targets of an attack.
-
Question 3 of 24
3. Question
1 pointsWhat is the objective of the governing policy in the security policy hierarchy structure?
Correct
Incorrect
A security policy is often broken up into a hierarchical structure consisting of three sub-policies:
- a governing policy
- a technical policy
- an end-user policy
The governing policy is a high-level policy that provides security guidelines for the entire company and outlines overall security goals.
Hint
A security policy is often broken up into a hierarchical structure consisting of three sub-policies:
- a governing policy
- a technical policy
- an end-user policy
The governing policy is a high-level policy that provides security guidelines for the entire company and outlines overall security goals.
-
Question 4 of 24
4. Question
1 pointsWhich type of security policy document is it that includes implementation details that usually contain step-by-step instructions and graphics?
Correct
Incorrect
There are three security policy documents:
- the standards document, which helps to maintain consistency in network operations
- the guidelines document, which gives suggestions on how to operate more securely and efficiently
- the procedures document, which gives detailed standards and guidelines that include step-by-step instructions
Hint
There are three security policy documents:
- the standards document, which helps to maintain consistency in network operations
- the guidelines document, which gives suggestions on how to operate more securely and efficiently
- the procedures document, which gives detailed standards and guidelines that include step-by-step instructions
-
Question 5 of 24
5. Question
1 pointsWhat is the purpose of a security awareness campaign?
Correct
Incorrect
A security awareness campaign is part of an effective security awareness program. The awareness campaign should focus on building security awareness and reinforcing good security practices at all levels of the organization.
Hint
A security awareness campaign is part of an effective security awareness program. The awareness campaign should focus on building security awareness and reinforcing good security practices at all levels of the organization.
-
Question 6 of 24
6. Question
1 pointsWhat is the goal of network penetration testing?
Correct
Incorrect
There are many security tests that can be used to assess a network. Penetration testing is used to determine the possible consequences of successful attacks on the network. Vulnerability scanning can detect potential weaknesses in systems. Password cracking can detect weak passwords. Integrity checkers can detect and report configuration changes.
Hint
There are many security tests that can be used to assess a network. Penetration testing is used to determine the possible consequences of successful attacks on the network. Vulnerability scanning can detect potential weaknesses in systems. Password cracking can detect weak passwords. Integrity checkers can detect and report configuration changes.
-
Question 7 of 24
7. Question
1 pointsWhat network security testing tool has the ability to provide details on the source of suspicious network activity?
Correct
Incorrect
There are various network security tools available for network security testing and evaluation. SuperScan is a Microsoft port scanning software that detects open TCP and UDP ports on systems. Nmap and Zenmap are low-level network scanners available to the public. Tripwire is used to assess if network devices are compliant with network security policies. SIEM is used to provide real-time reporting of security events on the network.
Hint
There are various network security tools available for network security testing and evaluation. SuperScan is a Microsoft port scanning software that detects open TCP and UDP ports on systems. Nmap and Zenmap are low-level network scanners available to the public. Tripwire is used to assess if network devices are compliant with network security policies. SIEM is used to provide real-time reporting of security events on the network.
-
Question 8 of 24
8. Question
1 pointsWhat network scanning tool has advanced features that allows it to use decoy hosts to mask the source of the scan?
Correct
Incorrect
There are various network security tools available for network security testing and evaluation. Nessus can scan systems for software vulnerabilities. Metasploit is used for penetration testing and IDS signature development. Tripwire is used to assess if network devices are compliant with network security policies. Nmap is a low-level network scanner available to the public that an administrator can use to identify network layer protocol support on hosts. Nnmap can use decoy hosts to mask the source of the scan.
Hint
There are various network security tools available for network security testing and evaluation. Nessus can scan systems for software vulnerabilities. Metasploit is used for penetration testing and IDS signature development. Tripwire is used to assess if network devices are compliant with network security policies. Nmap is a low-level network scanner available to the public that an administrator can use to identify network layer protocol support on hosts. Nnmap can use decoy hosts to mask the source of the scan.
-
Question 9 of 24
9. Question
1 pointsWhat network testing tool can be used to identify network layer protocols running on a host?
Correct
Incorrect
There are various network security tools available for network security testing and evaluation. Nmap is a low-level network scanner that is available to the public that has the ability to perform port scanning and system identification. Tripwire is used to assess if network devices are compliant with network security policies. L0phtcrack can be used to perform password auditing and recovery. SIEM is used to proved real-time reporting of security events.
Hint
There are various network security tools available for network security testing and evaluation. Nmap is a low-level network scanner that is available to the public that has the ability to perform port scanning and system identification. Tripwire is used to assess if network devices are compliant with network security policies. L0phtcrack can be used to perform password auditing and recovery. SIEM is used to proved real-time reporting of security events.
-
Question 10 of 24
10. Question
1 pointsWhat type of network security test would be used by network administrators for detection and reporting of changes to network systems?
Correct
Incorrect
There are many security tests that can be used to assess a network. Penetration testing is used to determine the possible consequences of successful attacks on the network. Integrity checking is used to detect and report changes made to systems. Vulnerability scanning is used to find weaknesses and misconfigurations on network systems. Network scanning is used to discover available resources on the network.
Hint
There are many security tests that can be used to assess a network. Penetration testing is used to determine the possible consequences of successful attacks on the network. Integrity checking is used to detect and report changes made to systems. Vulnerability scanning is used to find weaknesses and misconfigurations on network systems. Network scanning is used to discover available resources on the network.
-
Question 11 of 24
11. Question
1 pointsWhat testing tool is available for network administrators who need a GUI version of Nmap?
Correct
Incorrect
Nmap and Zenmap are low-level network scanners available to the public. Zenmap is the GUI version of Nmap. SuperScan is a Microsoft port scanning software that detects open TCP and UDP ports on systems. Nessus can scan systems for software vulnerabilities. SIEM is used to provide real-time reporting of security events.
Hint
Nmap and Zenmap are low-level network scanners available to the public. Zenmap is the GUI version of Nmap. SuperScan is a Microsoft port scanning software that detects open TCP and UDP ports on systems. Nessus can scan systems for software vulnerabilities. SIEM is used to provide real-time reporting of security events.
-
Question 12 of 24
12. Question
1 pointsWhich initial step should be followed when a security breach is found on a corporate system?
Correct
Incorrect
If a security breach occurs, it is necessary to follow the proper procedures.
The infected system should be isolated immediately.
A drive image should be taken before working with data on the hard drive of the infected system.
After data is collected but before equipment is disconnected, there should be photographs taken of the equipment before anything else should be done.
A chain of custody should be established identifying all evidence.Hint
If a security breach occurs, it is necessary to follow the proper procedures.
The infected system should be isolated immediately.
A drive image should be taken before working with data on the hard drive of the infected system.
After data is collected but before equipment is disconnected, there should be photographs taken of the equipment before anything else should be done.
A chain of custody should be established identifying all evidence. -
Question 13 of 24
13. Question
1 pointsWhat step should be taken after data is collected, but before equipment is disconnected, if a security breach is found on a system?
Correct
Incorrect
If a security breach occurs, it is necessary to follow the proper procedures.
The infected system should be insolated immediately.
A drive image should be taken before working with data on the hard drive of the infected system.
After data is collected but before equipment is disconnected, there should be photographs taken of the equipment before anything else is done.Hint
If a security breach occurs, it is necessary to follow the proper procedures.
The infected system should be insolated immediately.
A drive image should be taken before working with data on the hard drive of the infected system.
After data is collected but before equipment is disconnected, there should be photographs taken of the equipment before anything else is done. -
Question 14 of 24
14. Question
1 pointsWhich security program is aimed at all levels of an organization, including end users and executive staff?
Correct
Incorrect
Awareness campaigns are designed for all levels of users and focus attention on security issues. Educational degree programs are programs at a college or university that assist a user in the study of concepts, issues, and principles as an IT security professional. Security training for IT staff would include courses that address in detail how to implement firewall technology. Certificate programs are conducted as a joint effort between schools and software or hardware vendors and are a form of training users.
Hint
Awareness campaigns are designed for all levels of users and focus attention on security issues. Educational degree programs are programs at a college or university that assist a user in the study of concepts, issues, and principles as an IT security professional. Security training for IT staff would include courses that address in detail how to implement firewall technology. Certificate programs are conducted as a joint effort between schools and software or hardware vendors and are a form of training users.
-
Question 15 of 24
15. Question
1 pointsWhat is implemented by administration to instruct end users in how to effectively conduct business safely within an organization?
Correct
Incorrect
Administration can reduce the loss of intellectual capital, critical data, and physical equipment by disseminating information to end users through the use of a security awareness program
Hint
Administration can reduce the loss of intellectual capital, critical data, and physical equipment by disseminating information to end users through the use of a security awareness program
-
Question 16 of 24
16. Question
2 pointsWhat are two major components of a security awareness program? (Choose two.)
Correct
Incorrect
Security awareness programs are designed to keep everyone aware of security issues and educate staff members via the use of awareness campaigns and training and education
Hint
Security awareness programs are designed to keep everyone aware of security issues and educate staff members via the use of awareness campaigns and training and education
-
Question 17 of 24
17. Question
1 pointsWhich type of documents include implementation details that usually contain step-by-step instructions and graphics?
Correct
Incorrect
There are multiple policy documents that exist for situations of varied needs. These include the following:
End-user policy documents that cover security topics important to end users
Standards documents that include hardware and software versioning requirements, program requirements, and any other organizational criteria that must be followed
Guideline documents that include suggestions on how to do things more efficiently and securely. They are more flexible than standards documents and are not usually mandatory.
Procedure documents that include details that usually contain step-by-step instructions and graphicsHint
There are multiple policy documents that exist for situations of varied needs. These include the following:
End-user policy documents that cover security topics important to end users
Standards documents that include hardware and software versioning requirements, program requirements, and any other organizational criteria that must be followed
Guideline documents that include suggestions on how to do things more efficiently and securely. They are more flexible than standards documents and are not usually mandatory.
Procedure documents that include details that usually contain step-by-step instructions and graphics -
Question 18 of 24
18. Question
1 pointsWhich type of documents help an organization establish consistency in the operations of the network by specifying criteria that must be followed?
Correct
Incorrect
There are multiple policy documents that exist for situations of varied needs. These include the following:
End user policy documents that cover security topics important to end users
Standards documents that include hardware and software versioning requirements, program requirements, and any other organizational criteria that must be followed
Guideline documents that include suggestions on how to do things more efficiently and securely, and which are more flexible than standards documents and are not usually mandatory.
Procedure documents that include details that usually contain step-by-step instructions and graphicsHint
There are multiple policy documents that exist for situations of varied needs. These include the following:
End user policy documents that cover security topics important to end users
Standards documents that include hardware and software versioning requirements, program requirements, and any other organizational criteria that must be followed
Guideline documents that include suggestions on how to do things more efficiently and securely, and which are more flexible than standards documents and are not usually mandatory.
Procedure documents that include details that usually contain step-by-step instructions and graphics -
Question 19 of 24
19. Question
1 pointsWhich policy outlines the overall security goals for managers and technical staff within a company?
Correct
Incorrect
Multiple types of security policies can exist within an organization. These may include the following:
Acceptable use policies that define what users are allowed and not allowed to do on the various system components
Governing policies that outline the overall security goals for managers and technical staff within a company
Technical policies that describe what the technical staff does and defines standards that are used to connect to the network
End-user policies that cover all rules pertaining to information security that end users should know about and followHint
Multiple types of security policies can exist within an organization. These may include the following:
Acceptable use policies that define what users are allowed and not allowed to do on the various system components
Governing policies that outline the overall security goals for managers and technical staff within a company
Technical policies that describe what the technical staff does and defines standards that are used to connect to the network
End-user policies that cover all rules pertaining to information security that end users should know about and follow -
Question 20 of 24
20. Question
1 pointsWhich type of security policy includes network access standards and server security policies?
Correct
Incorrect
Multiple types of security policies can exist within an organization. These may include the following:
Acceptable use policies that define what users are allowed and not allowed to do on the various system components
Governing policies that outline the overall security goals for managers and technical staff within a company
Technical policies that describe what the technical staff does and defines standards that are used to connect to the network
End user policies that cover all rules pertaining to information security that end users should know about and followHint
Multiple types of security policies can exist within an organization. These may include the following:
Acceptable use policies that define what users are allowed and not allowed to do on the various system components
Governing policies that outline the overall security goals for managers and technical staff within a company
Technical policies that describe what the technical staff does and defines standards that are used to connect to the network
End user policies that cover all rules pertaining to information security that end users should know about and follow -
Question 21 of 24
21. Question
1 pointsWhich type of security policy includes acceptable encryption methods?
Correct
Incorrect
Multiple types of security policies can exist within an organization. These may include the following:
Acceptable use policies that define what users are allowed and not allowed to do on the various system components
Governing policies that outline the overall security goals for managers and technical staff within a company
Technical policies that describe what the technical staff does and defines standards that are used to connect to the network
End-user policies that cover all rules pertaining to information security that end users should know about and followHint
Multiple types of security policies can exist within an organization. These may include the following:
Acceptable use policies that define what users are allowed and not allowed to do on the various system components
Governing policies that outline the overall security goals for managers and technical staff within a company
Technical policies that describe what the technical staff does and defines standards that are used to connect to the network
End-user policies that cover all rules pertaining to information security that end users should know about and follow -
Question 22 of 24
22. Question
1 pointsWhat is the determining factor in the content of a security policy within an organization?
Correct
Incorrect
When the content of a security policy is being determined, the audience that is targeted in the policy is the determining factor in why something is required or what the noncompliance consequences will be.
Hint
When the content of a security policy is being determined, the audience that is targeted in the policy is the determining factor in why something is required or what the noncompliance consequences will be.
-
Question 23 of 24
23. Question
1 pointsWhich executive position is ultimately responsible for the success of an organization?
Correct
Incorrect
In the comparison of common executive titles:
- The Chief Executive Officer, also known as the CEO is ultimately responsible for the success of an organization.
- The Chief Technology Officer is responsible for maintaining and improving existing systems.
- The Chief Information Officer is responsible for all IT and computer systems that support enterprise goals.
- The Chief Security Officer must limit exposure to liability in all areas of financial, physical, and personal risk.
Hint
In the comparison of common executive titles:
- The Chief Executive Officer, also known as the CEO is ultimately responsible for the success of an organization.
- The Chief Technology Officer is responsible for maintaining and improving existing systems.
- The Chief Information Officer is responsible for all IT and computer systems that support enterprise goals.
- The Chief Security Officer must limit exposure to liability in all areas of financial, physical, and personal risk.
-
Question 24 of 24
24. Question
3 pointsMatch the network security testing tool with the correct function. (Not all options are used.)
Sort elements
- used to assess if network devices are compliant with network security policies
- used to scan systems for software vulnerabilities
- used for Layer 3 port scanning
- used to provide real-time reporting of security events
-
Tripwire
-
Nessus
-
Nmap
Correct
Incorrect