Sie sind auf Seite 1von 10

Answer CCNA Security Chapter 9 Test CCNAS v1.

1 | Invisible Algorithm

Home

Category

Search

Sitemap

Contact Us

About

VMware Courses-Free Exams


VMware and Zimbra training courses Register today and become a VCP
www.alfavad.com

Answer CCNA Security Chapter 9 Test CCNAS v1.1


Posted on August 5, 2012

RECENTLY WRI TTEN

Disable w3 Total Cache Plugin Completely Unable to Connect to Internet Eset Smart Security Atheros AR5007EG Windows 7 Driver Network Security Chapter 4 Packet Tracer Activity A Answer Answer CCNA Security Chapter 10 Test CCNAS v1.1

COFFEE FOR ME

SEARCH

In this post, i will share the answer for CCNA Security Chapter 9 Test. The answers discussed below has been claimed to be 100% correct. All the questions are based on CCNAS v1.1. Hopefully, the

Search

http://www.invialgo.com/2012/answer-ccna-security-chapter-9-test-ccnas-v1-1/[11/1/2012 1:21:55 AM]

Answer CCNA Security Chapter 9 Test CCNAS v1.1 | Invisible Algorithm

questions and answers provided below will be a good reference for all of us.
Login

Invisible Algorithm

In which phase of the system development life cycle should security requirements be addressed? Add security requirements during the initiation phase. Include a minimum set of security requirements at each phase. Apply critical security requirements during the implementation phase. Implement the majority of the security requirements at the acquisition phase.

on Facebook Like

105 people like


Facebook social plugin

Follow

+6

Find us on Google+

Which type of analysis uses a mathematical model that assigns a monetary figure to the value of assets, the cost of threats being realized, and the cost of security implementations? Qualitative Risk Analysis Quantitative Risk Analysis Qualitative Asset Analysis Quantitative Continuity Analysis

Which term describes a completely redundant backup facility, with almost identical equipment to the operational facility, that is maintained in the event of a disaster? backup site
CCNA SECURI TY

cold site hot site

Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5

http://www.invialgo.com/2012/answer-ccna-security-chapter-9-test-ccnas-v1-1/[11/1/2012 1:21:55 AM]

Answer CCNA Security Chapter 9 Test CCNAS v1.1 | Invisible Algorithm

reserve site

Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Final Exam

Which network security test requires a network administrator to launch an attack within the network? network scan password crack penetration test vulnerability scan

X.25 Network Conversion


Best Value for X.25TCP/IP Gateways Supports XOT, SVC, PVC, SNMP & LAPB
www.microtronix.com

Prooftag Brand Protection


Traceabily, authentication and interactive marketing solutions
www.prooftag.net

Which three documents comprise the hierarchical structure of a comprehensive security policy for an organization? (Choose three.) backup policy server policy incident policy governing policy end-user policy technical policy

IPv6 Consulting Services


Experienced, Vendor Independent IPv6 Integration Consulting Service
www.nephos6.com/services

Free SSL Security Guides


Range of Free SSL Product and Technical guides from Thawte
www.thawte.com

Software for SMBs


Web, Email, Network Security, Fax Archiving, Compliance and many more
www.orthology.gr

RANDOM TERMS

Which three detailed documents are used by security staff for an organization to implement the security policies? (Choose three.) asset inventory best practices guidelines procedures

copyright school youtube answers rooter sk17i xperia mini pro ics ccna chapter 4 exam answers ccna 4 0 100 % answers final exam ccna level 1 chapter 8

http://www.invialgo.com/2012/answer-ccna-security-chapter-9-test-ccnas-v1-1/[11/1/2012 1:21:55 AM]

Answer CCNA Security Chapter 9 Test CCNAS v1.1 | Invisible Algorithm

risk assessment standards

What are the two major components of a security awareness program? (Choose two.) awareness campaign security policy development security solution development self-defending network implementation training and education

When an organization implements the two-person control principle, how are tasks handled? A task requires two individuals who review and approve the work of each other. A task is broken down into two parts, and each part is assigned to a different individual. A task must be completed twice by two operators who must achieve the same results. A task is rotated among individuals within a team, each completing the entire task for a specific amount of time.

Which component of the security policy lists specific websites, newsgroups, or bandwidth-intensive applications that are not allowed on the company network? remote access policies acceptable use policies

http://www.invialgo.com/2012/answer-ccna-security-chapter-9-test-ccnas-v1-1/[11/1/2012 1:21:55 AM]

Answer CCNA Security Chapter 9 Test CCNAS v1.1 | Invisible Algorithm

incident handling procedures identification and authentication policies

Which security document includes implementation details, usually with step-by-step instructions and graphics? guideline document standard document procedure document overview document

Which option describes ethics? Ethics is a standard that is higher than the law. Ethics involves government agencies enforcing regulations. Ethics compliance is the basis for setting security policies. Ethics deals with criminal law and monetary compensation.

In the Cisco SecureX architecture, which component is considered the workhorse of policy enforcement? next-generation endpoint policy management console scanning engine Security Intelligence Operations

http://www.invialgo.com/2012/answer-ccna-security-chapter-9-test-ccnas-v1-1/[11/1/2012 1:21:55 AM]

Answer CCNA Security Chapter 9 Test CCNAS v1.1 | Invisible Algorithm

Which development has contributed most to the growing demand for a borderless network? consumer endpoints DMZ services corporate managed laptops personal firewall software

Which aspect of a scanning element is able to determine a security policy to apply based on information such as the person using the device, the location of the device, and the application being used? context awareness perimeter awareness centralized enforcement perimeter deployment

A company is considering implementing the Cisco SecureX security architecture. What is the purpose of Cisco TrustSec? It is a technology that implements packet tagging to allow security elements. It is a large cloud-based security ecosystem with global correlation. It is a stand-alone appliance managed from a central policy console. It is a perimeter-based, stand-alone network scanning device. elements to share information from scanning

Which statement about network security within the SecureX architecture is true?

http://www.invialgo.com/2012/answer-ccna-security-chapter-9-test-ccnas-v1-1/[11/1/2012 1:21:55 AM]

Answer CCNA Security Chapter 9 Test CCNAS v1.1 | Invisible Algorithm

It is located closer to the end user. It is implemented in the network core. It is enforced in a highly centralized structure. It is managed by a single policy.

Which

Cisco

SecureX

product

family

would

be primarily

responsible for detecting and blocking attacks and exploits, while preventing intruder access? secure e-mail and web secure access secure mobility secure data center secure network

Which SecureX product family would include Cisco AnyConnect? secure network secure e-mail and web secure access secure mobility secure data center

If a web browser is to be used, and not a hardware or softwarebased client, which Cisco solution is best for establishing a secure VPN connection?

http://www.invialgo.com/2012/answer-ccna-security-chapter-9-test-ccnas-v1-1/[11/1/2012 1:21:55 AM]

Answer CCNA Security Chapter 9 Test CCNAS v1.1 | Invisible Algorithm

VPN Services for Cisco ASA Series Cisco Adaptive Wireless IPS Software Cisco AnyConnect Secure Mobility Solutions Cisco Virtual Security Gateway

Which Cisco secure access solution can be used to determine if hosts are compliant with security policies? Network Admission Control Appliance Cisco Secure Access Control System Cisco AnyConnect Secure Mobility Solutions Cisco Adaptive Wireless IPS Software

What protocol is used by SCP for secure transport? IPSec HTTPS SSH Telnet TFTP

If you unable to achieve 100% mark for this CCNA Security Chapter 9 Test following all questions and answers given above please leave your comment below. We do appreciate any correction you provided or any new and updated questions. With all the knowledge that we shared, hopefully it will benefits all of us. Credit: All questions and answers for CCNA Security Chapter 9 provided by Xase. All credits goes to him.

http://www.invialgo.com/2012/answer-ccna-security-chapter-9-test-ccnas-v1-1/[11/1/2012 1:21:55 AM]

Answer CCNA Security Chapter 9 Test CCNAS v1.1 | Invisible Algorithm

Vpn Connection

Vpn Services

Hosts

Personal Loan

This entry was posted in Data Network, Network Security and tagged 2012, Answer, CCNA Security, CCNA Security Chapter 9 Answer, CCNA Security Chapter 9 Test, CCNAS Chapter 9 Test, CCNAS v1.1, Chapter 9 Test, Solution, Solution CCNA Security Chapter 9 by InviAlgo. Bookmark the permalink.

Leave a Reply
Your email address will not be published. Required fields are marked *

Name

Email

Website

Comment

All All

Post Comment

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Search Invisible Algorithm: ccna security chapter 9 exam answers, ccna security chapter 9, ccna

http://www.invialgo.com/2012/answer-ccna-security-chapter-9-test-ccnas-v1-1/[11/1/2012 1:21:55 AM]

Answer CCNA Security Chapter 9 Test CCNAS v1.1 | Invisible Algorithm

chapter 9 answers 2012, ccna security chapter 9 answers, ccna security chapter 9 exam answers 100, Which development has contributed most to the growing demand for a borderless network?, which securex product family would include cisco anyconnect?, ccna security, In the Cisco SecureX architecture which component is considered the workhorse of policy enforcement?, ccna security chapter 9 v1 1

http://www.invialgo.com/2012/answer-ccna-security-chapter-9-test-ccnas-v1-1/[11/1/2012 1:21:55 AM]