CCNA Security Chapter 11 Exam v2

Last Updated on by

Implementing Network Security ( Version 2.0) – CCNAS Chapter 11 Exam Answers 2019 Full 100%

  1. Which security test is appropriate for detecting system weaknesses such as misconfiguration, default passwords, and potential DoS targets?

    • penetration testing
    • vulnerability scanning
    • network scanning
    • integrity checkers
      Explanation:

      There are many tests used to assess the operational status of networks and systems. Weaknesses in systems such as blank or default passwords, or misconfigurations that would make a system a target of a DoS attack can be detected through vulnerability scanning.

  2. How does network scanning help assess operations security?

    • It can log abnormal activity.
    • It can detect weak or blank passwords.
    • It can detect open TCP ports on network systems.
    • It can simulate attacks from malicious sources.
      Explanation:

      Network scanning can help a network administrator strengthen the security of the network and systems by identifying open TCP and UDP ports that could be targets of an attack.

  3. What is the objective of the governing policy in the security policy hierarchy structure?

    • It covers all rules pertaining to information security that end users should know about and follow.
    • It defines system and issue-specific policies that describe what the technical staff does.
    • It provides general policies on how the technical staff should perform security functions.
    • It outlines the company’s overall security goals for managers and technical staff.
      Explanation:

      A security policy is often broken up into a hierarchical structure consisting of three sub-policies:

      1. a governing policy
      2. a technical policy
      3. an end-user policy

      The governing policy is a high-level policy that provides security guidelines for the entire company and outlines overall security goals.

  4. Which type of security policy document is it that includes implementation details that usually contain step-by-step instructions and graphics?

    • procedure document
    • guideline document
    • standards document
    • best practices document
      Explanation:

      There are three security policy documents:

      1. the standards document, which helps to maintain consistency in network operations
      2. the guidelines document, which gives suggestions on how to operate more securely and efficiently
      3. the procedures document, which gives detailed standards and guidelines that include step-by-step instructions
  5. What is the purpose of a security awareness campaign?

    • to teach skills so employees can perform security tasks
    • to integrate all the security skills and competencies into a single body of knowledge
    • to focus the attention of employees on security issues
    • to provide users with a training curriculum that can ultimately lead to a formal degree
      Explanation:

      A security awareness campaign is part of an effective security awareness program. The awareness campaign should focus on building security awareness and reinforcing good security practices at all levels of the organization.

  6. What is the goal of network penetration testing?

    • determining the feasibility and the potential consequences of a successful attack
    • detecting potential weaknesses in systems
    • detecting weak passwords
    • detecting configuration changes on network systems
      Explanation:

      There are many security tests that can be used to assess a network. Penetration testing is used to determine the possible consequences of successful attacks on the network. Vulnerability scanning can detect potential weaknesses in systems. Password cracking can detect weak passwords. Integrity checkers can detect and report configuration changes.

  7. What network security testing tool has the ability to provide details on the source of suspicious network activity?

    • SIEM
    • SuperScan
    • Tripwire
    • Zenmap
      Explanation:

      There are various network security tools available for network security testing and evaluation. SuperScan is a Microsoft port scanning software that detects open TCP and UDP ports on systems. Nmap and Zenmap are low-level network scanners available to the public. Tripwire is used to assess if network devices are compliant with network security policies. SIEM is used to provide real-time reporting of security events on the network.

  8. What network scanning tool has advanced features that allows it to use decoy hosts to mask the source of the scan?

    • Nmap
    • Tripwire
    • Nessus
    • Metasploit
      Explanation:

      There are various network security tools available for network security testing and evaluation. Nessus can scan systems for software vulnerabilities. Metasploit is used for penetration testing and IDS signature development. Tripwire is used to assess if network devices are compliant with network security policies. Nmap is a low-level network scanner available to the public that an administrator can use to identify network layer protocol support on hosts. Nnmap can use decoy hosts to mask the source of the scan.

  9. What network testing tool can be used to identify network layer protocols running on a host?

    • Nmap
    • Tripwire
    • L0phtcrack
    • SIEM
      Explanation:

      There are various network security tools available for network security testing and evaluation. Nmap is a low-level network scanner that is available to the public that has the ability to perform port scanning and system identification. Tripwire is used to assess if network devices are compliant with network security policies. L0phtcrack can be used to perform password auditing and recovery. SIEM is used to proved real-time reporting of security events.

  10. What type of network security test would be used by network administrators for detection and reporting of changes to network systems?

    • integrity checking
    • penetration testing
    • vulnerability scanning
    • network scanning
      Explanation:

      There are many security tests that can be used to assess a network. Penetration testing is used to determine the possible consequences of successful attacks on the network. Integrity checking is used to detect and report changes made to systems. Vulnerability scanning is used to find weaknesses and misconfigurations on network systems. Network scanning is used to discover available resources on the network.

  11. What testing tool is available for network administrators who need a GUI version of Nmap?

    • Zenmap
    • SIEM
    • SuperScan
    • Nessus
      Explanation:

      Nmap and Zenmap are low-level network scanners available to the public. Zenmap is the GUI version of Nmap. SuperScan is a Microsoft port scanning software that detects open TCP and UDP ports on systems. Nessus can scan systems for software vulnerabilities. SIEM is used to provide real-time reporting of security events.

  12. Which initial step should be followed when a security breach is found on a corporate system?

    • Create a drive image of the system.
    • Photograph the system.
    • Isolate the infected system.
    • Establish a chain of custody.
      Explanation:

      If a security breach occurs, it is necessary to follow the proper procedures.
      The infected system should be isolated immediately.
      A drive image should be taken before working with data on the hard drive of the infected system.
      After data is collected but before equipment is disconnected, there should be photographs taken of the equipment before anything else should be done.
      A chain of custody should be established identifying all evidence.

  13. What step should be taken after data is collected, but before equipment is disconnected, if a security breach is found on a system?

    • Create a drive image of the system.
    • Photograph the system.
    • Isolate the infected system.
    • Determine if data tampering has occurred.
      Explanation:

      If a security breach occurs, it is necessary to follow the proper procedures.
      The infected system should be insolated immediately.
      A drive image should be taken before working with data on the hard drive of the infected system.
      After data is collected but before equipment is disconnected, there should be photographs taken of the equipment before anything else is done.

  14. Which security program is aimed at all levels of an organization, including end users and executive staff?

    • educational degree programs
    • awareness campaigns
    • firewall implementation training courses
    • certificate programs
      Explanation:

      Awareness campaigns are designed for all levels of users and focus attention on security issues. Educational degree programs are programs at a college or university that assist a user in the study of concepts, issues, and principles as an IT security professional. Security training for IT staff would include courses that address in detail how to implement firewall technology. Certificate programs are conducted as a joint effort between schools and software or hardware vendors and are a form of training users.

  15. What is implemented by administration to instruct end users in how to effectively conduct business safely within an organization?

    • security awareness program
    • governing policy
    • technical policy
    • noncompliance consequences
      Explanation:

      Administration can reduce the loss of intellectual capital, critical data, and physical equipment by disseminating information to end users through the use of a security awareness program

  16. What are two major components of a security awareness program? (Choose two.)

    • procedure documents
    • awareness campaigns
    • guideline documents
    • technical policy
    • education and training
      Explanation:

      Security awareness programs are designed to keep everyone aware of security issues and educate staff members via the use of awareness campaigns and training and education

  17. Which type of documents include implementation details that usually contain step-by-step instructions and graphics?

    • procedure documents
    • guideline documents
    • standards documents
    • end-user policy documents
      Explanation:

      There are multiple policy documents that exist for situations of varied needs. These include the following:
      End-user policy documents that cover security topics important to end users
      Standards documents that include hardware and software versioning requirements, program requirements, and any other organizational criteria that must be followed
      Guideline documents that include suggestions on how to do things more efficiently and securely. They are more flexible than standards documents and are not usually mandatory.
      Procedure documents that include details that usually contain step-by-step instructions and graphics

  18. Which type of documents help an organization establish consistency in the operations of the network by specifying criteria that must be followed?

    • procedures
    • guidelines
    • standards
    • end user policies
      Explanation:

      There are multiple policy documents that exist for situations of varied needs. These include the following:
      End user policy documents that cover security topics important to end users
      Standards documents that include hardware and software versioning requirements, program requirements, and any other organizational criteria that must be followed
      Guideline documents that include suggestions on how to do things more efficiently and securely, and which are more flexible than standards documents and are not usually mandatory.
      Procedure documents that include details that usually contain step-by-step instructions and graphics

  19. Which policy outlines the overall security goals for managers and technical staff within a company?

    • end-user policy
    • technical policy
    • governing policy
    • acceptable use policy
      Explanation:

      Multiple types of security policies can exist within an organization. These may include the following:
      Acceptable use policies that define what users are allowed and not allowed to do on the various system components
      Governing policies that outline the overall security goals for managers and technical staff within a company
      Technical policies that describe what the technical staff does and defines standards that are used to connect to the network
      End-user policies that cover all rules pertaining to information security that end users should know about and follow

  20. Which type of security policy includes network access standards and server security policies?

    • technical policy
    • governing policy
    • end user policy
    • acceptable use policy
      Explanation:

      Multiple types of security policies can exist within an organization. These may include the following:
      Acceptable use policies that define what users are allowed and not allowed to do on the various system components
      Governing policies that outline the overall security goals for managers and technical staff within a company
      Technical policies that describe what the technical staff does and defines standards that are used to connect to the network
      End user policies that cover all rules pertaining to information security that end users should know about and follow

  21. Which type of security policy includes acceptable encryption methods?

    • governing policy
    • technical policy
    • acceptable use policy
    • end-user policy
      Explanation:

      Multiple types of security policies can exist within an organization. These may include the following:
      Acceptable use policies that define what users are allowed and not allowed to do on the various system components
      Governing policies that outline the overall security goals for managers and technical staff within a company
      Technical policies that describe what the technical staff does and defines standards that are used to connect to the network
      End-user policies that cover all rules pertaining to information security that end users should know about and follow

  22. What is the determining factor in the content of a security policy within an organization?

    • the best practices
    • the chief executive officer
    • the security staff
    • the audience
      Explanation:

      When the content of a security policy is being determined, the audience that is targeted in the policy is the determining factor in why something is required or what the noncompliance consequences will be.

  23. Which executive position is ultimately responsible for the success of an organization?

    • Chief Security Officer
    • Chief Technology Officer
    • Chief Executive Officer
    • Chief Information Officer
      Explanation:

      In the comparison of common executive titles:The Chief Executive Officer, also known as the CEO is ultimately responsible for the success of an organization.
      The Chief Technology Officer is responsible for maintaining and improving existing systems.
      The Chief Information Officer is responsible for all IT and computer systems that support enterprise goals.
      The Chief Security Officer must limit exposure to liability in all areas of financial, physical, and personal risk.

  24. Match the network security testing tool with the correct function. (Not all options are used.)

    Implementing Network Security ( Version 2.0) - CCNAS Chapter 11 Exam Answers 2019 001

    Implementing Network Security ( Version 2.0) – CCNAS Chapter 11 Exam Answers 2019 001