Cisco Security Chapter 11

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

vulnerability scanning

Which security test is appropriate for detecting system weaknesses such as misconfiguration, default passwords, and potential DoS targets?

2
New cards

It can detect open TCP ports on network systems

How does network scanning help assess operations security?

3
New cards

It outlines the company's overall security goals for managers and technical staff

What is the objective of the governing policy in the security policy hierarchy structure?

4
New cards

procedure document

Which type of security policy document is it that includes implementation details that usually contain step-by-step instructions and graphics?

5
New cards

to focus the attention of employees on security issues

What is the purpose of a security awareness campaign?

6
New cards

determining the feasibility and the potential consequences of a successful attack

What is the goal of network penetration testing?

7
New cards

SIEM

What network security testing tool has the ability to provide details on the source of suspicious network activity?

8
New cards

Nmap

What network scanning tool has advanced features that allows it to use decoy hosts to mask the source of the scan?

9
New cards

Nmap

What network testing tool can be used to identify network layer protocols running on a host?

10
New cards

integrity checking

What type of network security test would be used by network administrators for detection and reporting of changes to network systems?

11
New cards

Zenmap

What testing tool is available for network administrators who need a GUI version of Nmap?

12
New cards

Isolate the infected system

Which initial step should be followed when a security breach is found on a corporate system?

13
New cards

Photograph the system

What step should be taken after data is collected, but before equipment is disconnected, if a security breach is found on a system?

14
New cards

awareness campaigns

Which security program is aimed at all levels of an organization, including end users and executive staff?

15
New cards

security awareness program

What is implemented by administration to instruct end users in how to effectively conduct business safely within an organization?

16
New cards

- awareness campaigns

- education and training

What are two major components of a security awareness program? (Choose two.)

17
New cards

procedure documents

Which type of documents include implementation details that usually contain step-by-step instructions and graphics?

18
New cards

standards

Which type of documents help an organization establish consistency in the operations of the network by specifying criteria that must be followed?

19
New cards

governing policy

Which policy outlines the overall security goals for managers and technical staff within a company?

20
New cards

technical policy

Which type of security policy includes network access standards and server security policies?

21
New cards

technical policy

Which type of security policy includes acceptable encryption methods?

22
New cards

the audience

What is the determining factor in the content of a security policy within an organization?

23
New cards

Chief Executive Officer

Which executive position is ultimately responsible for the success of an organization?

24
New cards

Nmap:

used for Layer 3 port scanning

Nessus:

used to scan systems for software vulnerabilities

Tripwire:

used to assess if network devices are compliant with network security policies

Match the network security testing tool with the correct function. (Not all options are used.)

<p>Match the network security testing tool with the correct function. (Not all options are used.)</p>