CCNA Security MCQs

CCNA Security MCQs

The following X MCQs have been compiled by our experts through research, in order to test your knowledge of the subject of X. We encourage you to answer these 20 multiple-choice questions to assess your proficiency.
Please continue by scrolling down.

1: SDLC: Implementation

A.   An attempt to secure hardware - software - and various media while investigating anomalous network behavior.

B.   1. Inspection of security system 2. System integration 3. Security certification 4. Security accreditation

C.   1. Separate duties (dual operator - two-man control) 2. Rotate duties (allows peer review) 3. System failure preparation (Trusted recovery) 4. Multiple personnel oversee configuration changes to anticipate issues

D.   1. Configuration management and control 2. Continuous monitoring

2: What are the 3 phases of disaster recovery?

A.   Many Cisco IOS routers can be configured with Intrusion Prevention System (IPS) - virtual private network (VPN) and firewall features.

B.   Analyze inline traffic for malicious activity. IPS can drop offending traffic - instruct appliances to block specific host - send alerts etc.

C.   Security Device Manager provides GUI for configuring security features (e.g. IPS - IPSec site-site VPN - firewall features)

D.   1. Emergency Response 2. Recovery 3. Return to Normal Operations

3: What is MARS?

A.   Monitors security devices and applications: Uses event correlation to collect events from multiple devices - reducing the number of false positives - Identified appropriate mitigation strategies - Uses Cisco NetFlow technology to more readily identif

B.   Cisco PIX 500 series of security appliances offer firewall and VPN-termination features.

C.   Risk Management: keeping damange to a minimum - Risk Avoidance: preventing risk from occuring

4: Cisco Security Products: HIPS

A.   Qualitative mathematically models the probability and severity of a risk while Quantitative uses a scenario model (better for big deployments)

B.   Many Cisco IOS routers can be configured with Intrusion Prevention System (IPS) - virtual private network (VPN) and firewall features.

C.   Integrated - Collaborative - Adaptive

D.   Host-based Intrusion Prevention System (HIPS) - Example Cisco Security Agent

5: SDLC Acquisition and Development Phase

A.   1. Information preservation 2. Media sanitation 3. Hardware and software disposal

B.   1. Non-disaster: Brief interruption 2. Disaster: Interruption 1-7 days 3. Catastrophe: Move to alternative site - all resources destroyed.

C.   Monitors security devices and applications: Uses event correlation to collect events from multiple devices - reducing the number of false positives - Identified appropriate mitigation strategies - Uses Cisco NetFlow technology to more readily identif

D.   1. Formalized risk assessment 2. Security functional requirements 3. Security assurance/legal requirements 4. Cost considerations 5. Security planning (security controls in use) 6. Design and development of security controls 7. Basic testing

6: What are two types of risk mitigation

A.   Cisco 5500 Adaptive Security Appliances (ASA) offers a wide variety of security solutions such as firewall - IPS - VPN - anti-spyware - antivirus - and anti-phishing.

B.   1. Information preservation 2. Media sanitation 3. Hardware and software disposal

C.   1. Relocating operations to another facility while the original facility is under repair 2. Using alternative forms of internal and external communication

D.   Risk Management: keeping damange to a minimum - Risk Avoidance: preventing risk from occuring

7: Cisco Security Products: IOS Router

A.   Monitors security devices and applications: Uses event correlation to collect events from multiple devices - reducing the number of false positives - Identified appropriate mitigation strategies - Uses Cisco NetFlow technology to more readily identif

B.   Application that provides AAA funtionality

C.   Many Cisco IOS routers can be configured with Intrusion Prevention System (IPS) - virtual private network (VPN) and firewall features.

D.   Consists of a collection of security solutions to identify - prevent and adapt to emerging threats.

8: What are two primary goals of business continuity planning?

A.   1. Formalized risk assessment 2. Security functional requirements 3. Security assurance/legal requirements 4. Cost considerations 5. Security planning (security controls in use) 6. Design and development of security controls 7. Basic testing

B.   Cisco 5500 Adaptive Security Appliances (ASA) offers a wide variety of security solutions such as firewall - IPS - VPN - anti-spyware - antivirus - and anti-phishing.

C.   Application that provides IPS services on a host.

D.   1. Relocating operations to another facility while the original facility is under repair 2. Using alternative forms of internal and external communication

9: Cisco Security Products: 4200 Series IPS

A.   Analyze inline traffic for malicious activity. IPS can drop offending traffic - instruct appliances to block specific host - send alerts etc.

B.   1. Inspection of security system 2. System integration 3. Security certification 4. Security accreditation

C.   An application used to configure security features on a variety of IOS-based routers - ASA 5500 - PIX 500 - IPS 4200 - Catalyst 6500 through a graphical interface. Also provides a centralized policy and inter-operates with Cisco ACS.

D.   Cisco 5500 Adaptive Security Appliances (ASA) offers a wide variety of security solutions such as firewall - IPS - VPN - anti-spyware - antivirus - and anti-phishing.

10: SDLC: Disposition

A.   Risk Management: keeping damange to a minimum - Risk Avoidance: preventing risk from occuring

B.   1. Relocating operations to another facility while the original facility is under repair 2. Using alternative forms of internal and external communication

C.   1. Information preservation 2. Media sanitation 3. Hardware and software disposal

D.   An attempt to secure hardware - software - and various media while investigating anomalous network behavior.

11: What is the difference between a Qualitative analysis and a Quantitative Analysis

A.   Qualitative mathematically models the probability and severity of a risk while Quantitative uses a scenario model (better for big deployments)

B.   1. Separate duties (dual operator - two-man control) 2. Rotate duties (allows peer review) 3. System failure preparation (Trusted recovery) 4. Multiple personnel oversee configuration changes to anticipate issues

C.   1. Non-disaster: Brief interruption 2. Disaster: Interruption 1-7 days 3. Catastrophe: Move to alternative site - all resources destroyed.

D.   1. Categorize severity of a security breach 2. Preliminary (high-level) risk assessment

12: Cisco Security Products: Firewall Services Module (FWSM)

A.   Consists of a collection of security solutions to identify - prevent and adapt to emerging threats.

B.   An attempt to secure hardware - software - and various media while investigating anomalous network behavior.

C.   Risk Management: keeping damange to a minimum - Risk Avoidance: preventing risk from occuring

D.   Module that goes in a Catalyst 6500 or similar to provide firewall services between VLANs.

13: Cisco Security Products: PIX 500

A.   1. Categorize severity of a security breach 2. Preliminary (high-level) risk assessment

B.   Risk Management: keeping damange to a minimum - Risk Avoidance: preventing risk from occuring

C.   Application that provides IPS services on a host.

D.   Cisco PIX 500 series of security appliances offer firewall and VPN-termination features.

14: Cisco Security Products: Cisco Security Agent (CSA)

A.   1. Hot site: completely redundant site 2. Warm site: similar - but outdated equipment 3. Cold site: network needs to be built from scratch

B.   Integrated - Collaborative - Adaptive

C.   Application that provides IPS services on a host.

D.   Module that goes in a Catalyst 6500 or similar to provide firewall services between VLANs.

15: What are the 4 Operations Security Recommendations

A.   1. Separate duties (dual operator - two-man control) 2. Rotate duties (allows peer review) 3. System failure preparation (Trusted recovery) 4. Multiple personnel oversee configuration changes to anticipate issues

B.   Host-based Intrusion Prevention System (HIPS) - Example Cisco Security Agent

C.   1. Categorize severity of a security breach 2. Preliminary (high-level) risk assessment

16: What is the ALE and how is it calculated?

A.   An application used to configure security features on a variety of IOS-based routers - ASA 5500 - PIX 500 - IPS 4200 - Catalyst 6500 through a graphical interface. Also provides a centralized policy and inter-operates with Cisco ACS.

B.   ALE = Monetary value to justify expense of security solutions AV = total cost of an asset EF = % representing percentage of loss that an asset experiences ARO = How many times per year a threat occurs

C.   1. Inspection of security system 2. System integration 3. Security certification 4. Security accreditation

D.   Cisco PIX 500 series of security appliances offer firewall and VPN-termination features.

17: What are the 3 types of backup sites?

A.   1. Inspection of security system 2. System integration 3. Security certification 4. Security accreditation

B.   1. Hot site: completely redundant site 2. Warm site: similar - but outdated equipment 3. Cold site: network needs to be built from scratch

C.   ALE = Monetary value to justify expense of security solutions AV = total cost of an asset EF = % representing percentage of loss that an asset experiences ARO = How many times per year a threat occurs

18: What are the 3 classifications of disruptions?

A.   Monitors security devices and applications: Uses event correlation to collect events from multiple devices - reducing the number of false positives - Identified appropriate mitigation strategies - Uses Cisco NetFlow technology to more readily identif

B.   1. Non-disaster: Brief interruption 2. Disaster: Interruption 1-7 days 3. Catastrophe: Move to alternative site - all resources destroyed.

C.   Risk Management: keeping damange to a minimum - Risk Avoidance: preventing risk from occuring

D.   1. Relocating operations to another facility while the original facility is under repair 2. Using alternative forms of internal and external communication

19: What is the Cisco Security Manager?

A.   1. Inspection of security system 2. System integration 3. Security certification 4. Security accreditation

B.   1. Emergency Response 2. Recovery 3. Return to Normal Operations

C.   An application used to configure security features on a variety of IOS-based routers - ASA 5500 - PIX 500 - IPS 4200 - Catalyst 6500 through a graphical interface. Also provides a centralized policy and inter-operates with Cisco ACS.

D.   Cisco 5500 Adaptive Security Appliances (ASA) offers a wide variety of security solutions such as firewall - IPS - VPN - anti-spyware - antivirus - and anti-phishing.

20: What is Operations Security?

A.   Application that provides IPS services on a host.

B.   An attempt to secure hardware - software - and various media while investigating anomalous network behavior.

C.   ALE = Monetary value to justify expense of security solutions AV = total cost of an asset EF = % representing percentage of loss that an asset experiences ARO = How many times per year a threat occurs

D.   1. Relocating operations to another facility while the original facility is under repair 2. Using alternative forms of internal and external communication

21: SDLC Initiation Phase

A.   Risk Management: keeping damange to a minimum - Risk Avoidance: preventing risk from occuring

B.   ALE = Monetary value to justify expense of security solutions AV = total cost of an asset EF = % representing percentage of loss that an asset experiences ARO = How many times per year a threat occurs

C.   Host-based Intrusion Prevention System (HIPS) - Example Cisco Security Agent

D.   1. Categorize severity of a security breach 2. Preliminary (high-level) risk assessment

22: What are the 5 phases of the System Development Life Cycle (SDLC)?

A.   1. Initiation 2. Acquisition and development 3. Implementation 4. Operations and maintenance 5. Disposition

B.   1. Configuration management and control 2. Continuous monitoring

C.   Module that goes in a Catalyst 6500 or similar to provide firewall services between VLANs.

D.   Security Device Manager provides GUI for configuring security features (e.g. IPS - IPSec site-site VPN - firewall features)

23: Cisco Security Products: Cisco Secure Access Control Server (ACS)

A.   Consists of a collection of security solutions to identify - prevent and adapt to emerging threats.

B.   Cisco 5500 Adaptive Security Appliances (ASA) offers a wide variety of security solutions such as firewall - IPS - VPN - anti-spyware - antivirus - and anti-phishing.

C.   Monitors security devices and applications: Uses event correlation to collect events from multiple devices - reducing the number of false positives - Identified appropriate mitigation strategies - Uses Cisco NetFlow technology to more readily identif

D.   Application that provides AAA funtionality

24: SDLC: Operations and Maintenance Phase

A.   Application that provides IPS services on a host.

B.   Integrated - Collaborative - Adaptive

C.   1. Configuration management and control 2. Continuous monitoring

D.   Application that provides AAA funtionality

25: What are the characteristics of the Cisco Self-Defending Network?

A.   Application that provides AAA funtionality

B.   Integrated - Collaborative - Adaptive

C.   Cisco PIX 500 series of security appliances offer firewall and VPN-termination features.

D.   An attempt to secure hardware - software - and various media while investigating anomalous network behavior.

26: Cisco Security Products: ASA 5500

A.   Risk Management: keeping damange to a minimum - Risk Avoidance: preventing risk from occuring

B.   Analyze inline traffic for malicious activity. IPS can drop offending traffic - instruct appliances to block specific hosts - send alerts etc.

C.   Cisco 5500 Adaptive Security Appliances (ASA) offers a wide variety of security solutions such as firewall - IPS - VPN - anti-spyware - antivirus - and anti-phishing.

D.   Host-based Intrusion Prevention System (HIPS) - Example Cisco Security Agent

27: Cisco Security Products: SDM

A.   Application that provides IPS services on a host.

B.   Security Device Manager provides GUI for configuring security features (e.g. IPS - IPSec site-site VPN - firewall features)

C.   ALE = Monetary value to justify expense of security solutions AV = total cost of an asset EF = % representing percentage of loss that an asset experiences ARO = How many times per year a threat occurs

D.   1. Categorize severity of a security breach 2. Preliminary (high-level) risk assessment

28: What is the Cisco Self-Defending Network?

A.   Consists of a collection of security solutions to identify - prevent and adapt to emerging threats.

B.   ALE = Monetary value to justify expense of security solutions AV = total cost of an asset EF = % representing percentage of loss that an asset experiences ARO = How many times per year a threat occurs

C.   An application used to configure security features on a variety of IOS-based routers - ASA 5500 - PIX 500 - IPS 4200 - Catalyst 6500 through a graphical interface. Also provides a centralized policy and inter-operates with Cisco ACS.

D.   An attempt to secure hardware - software - and various media while investigating anomalous network behavior.