Answer CCNA Security Chapter 11 Test – CCNAS v2.0

Question 24 Chapter 11 Test v2.0

This post contains Question and Answer CCNA Security Chapter 11 Test Version 2.0. With this complete questions and answers for chapter 11 test v2.0, i hope it will be a good guide for you guys to perform well in your CCNAS Chapter Test. If you have any correction or any new questions, do comment at the bottom of this post.

  1. Which security test is appropriate for detecting system weaknesses such as misconfiguration, default passwords, and potential DoS targets?

vulnerability scanning

network scanning

integrity checkers

penetration testing

 

  1. How does network scanning help assess operations security?

It can simulate attacks from malicious sources.

It can log abnormal activity.

It can detect open TCP ports on network systems.

It can detect weak or blank passwords.

 

  1. What is the objective of the governing policy in the security policy hierarchy structure?

It covers all rules pertaining to information security that end users should know about and follow.

It outlines the company’s overall security goals for managers and technical staff.

It provides general policies on how the technical staff should perform security functions.

It defines system and issue-specific policies that describe what the technical staff does.

 

  1. Which type of security policy document is it that includes implementation details that usually contain step-by-step instructions and graphics?

best practices document

procedure document

standards document

guideline document

 

  1. What is the purpose of a security awareness campaign?

to teach skills so employees can perform security tasks

to focus the attention of employees on security issues

to provide users with a training curriculum that can ultimately lead to a formal degree

to integrate all the security skills and competencies into a single body of knowledge

 

  1. What is the goal of network penetration testing?

detecting configuration changes on network systems

detecting potential weaknesses in systems

determining the feasibility and the potential consequences of a successful attack

detecting weak passwords

 

  1. What network security testing tool has the ability to provide details on the source of suspicious network activity?

SIEM

SuperScan

Zenmap

Tripwire

 

  1. What network scanning tool has advanced features that allows it to use decoy hosts to mask the source of the scan?

Nessus

Metasploit

Tripwire

Nmap

 

  1. What network testing tool can be used to identify network layer protocols running on a host?

SIEM

Nmap

L0phtcrack

Tripwire

 

  1. What type of network security test would be used by network administrators for detection and reporting of changes to network systems?

penetration testing

vulnerability scanning

integrity checking

network scanning

 

  1. What testing tool is available for network administrators who need a GUI version of Nmap?

Nessus

SIEM

Zenmap

SuperScan

 

  1. Which initial step should be followed when a security breach is found on a corporate system?

Create a drive image of the system.

Isolate the infected system.

Establish a chain of custody.

Photograph the system.

 

  1. What step should be taken after data is collected, but before equipment is disconnected, if a security breach is found on a system?

Create a drive image of the system.

Isolate the infected system.

Photograph the system.

Determine if data tampering has occurred.

 

  1. Which security program is aimed at all levels of an organization, including end users and executive staff?

educational degree programs

certificate programs

awareness campaigns

firewall implementation training courses

 

  1. What is implemented by administration to instruct end users in how to effectively conduct business safely within an organization?

security awareness program

governing policy

noncompliance consequences

technical policy

 

  1. What are two major components of a security awareness program? (Choose two.)

technical policy

procedure documents

awareness campaigns

guideline documents

education and training

 

  1. Which type of documents include implementation details that usually contain step-by-step instructions and graphics?

standards documents

procedure documents

guideline documents

end-user policy documents

 

  1. Which type of documents help an organization establish consistency in the operations of the network by specifying criteria that must be followed?

guidelines

standards

procedures

end user policies

 

  1. Which policy outlines the overall security goals for managers and technical staff within a company?

acceptable use policy

technical policy

governing policy

end-user policy

 

  1. Which type of security policy includes network access standards and server security policies?

end user policy

technical policy

governing policy

acceptable use policy

 

  1. Which type of security policy includes acceptable encryption methods?

governing policy

acceptable use policy

technical policy

end-user policy

 

  1. What is the determining factor in the content of a security policy within an organization?

the security staff

the audience

the chief executive officer

the best practices

 

  1. Which executive position is ultimately responsible for the success of an organization?

Chief Technology Officer

Chief Executive Officer

Chief Security Officer

Chief Information Officer

 

24. Question 24 Chapter 11 Test v2.0

Tripwire

Nessus

Nmap

Blank

 

Do comment if you have new question or if you find any correction needed. You are always welcome to email to admin@invialgo.com for any contribution. Thank you

4 thoughts on “Answer CCNA Security Chapter 11 Test – CCNAS v2.0”

Leave a Reply

Your email address will not be published. Required fields are marked *