Chapter 11: Managing a Secure Network

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

security awareness program

What is implemented by administration to instruct end users in how to effectively conduct business safely within an organization? security awareness program governing policy technical policy noncompliance consequences

determining the feasibility and the potential consequences of a successful attack

What is the goal of network penetration testing? determining the feasibility and the potential consequences of a successful attack detecting potential weaknesses in systems detecting weak passwords detecting configuration changes on network systems

Zenmap

What testing tool is available for network administrators who need a GUI version of Nmap? Zenmap SIEM SuperScan Nessus

governing policy

Which policy outlines the overall security goals for managers and technical staff within a company? end-user policy technical policy governing policy acceptable use policy

the audience

What is the determining factor in the content of a security policy within an organization? the best practices the chief executive officer the security staff the audience

It can detect open TCP ports on network systems.

How does network scanning help assess operations security? It can log abnormal activity. It can detect weak or blank passwords. It can detect open TCP ports on network systems. It can simulate attacks from malicious sources.

used to assess if network devices are compliant with network security policies Tripware used to scan systems for software vulnerabilities Nessus used for Layer 3 port scanning Nmap

Match the network security testing tool with the correct function. Nmap Nessus Tripware used to assess if network devices are compliant with network security policies used to scan systems for software vulnerabilities used for Layer 3 port scanning

awareness campaigns education and training

What are two major components of a security awareness program? (Choose two.) procedure documents awareness campaigns guideline documents technical policy education and training

It outlines the company's overall security goals for managers and technical staff.

What is the objective of the governing policy in the security policy hierarchy structure? It covers all rules pertaining to information security that end users should know about and follow. It defines system and issue-specific policies that describe what the technical staff does. It provides general policies on how the technical staff should perform security functions. It outlines the company's overall security goals for managers and technical staff.

to focus the attention of employees on security issues

What is the purpose of a security awareness campaign? to teach skills so employees can perform security tasks to integrate all the security skills and competencies into a single body of knowledge to focus the attention of employees on security issues to provide users with a training curriculum that can ultimately lead to a formal degree

Nmap

What network scanning tool has advanced features that allows it to use decoy hosts to mask the source of the scan? Nmap Tripwire Nessus Metasploit

SIEM

What network security testing tool has the ability to provide details on the source of suspicious network activity? SIEM SuperScan Tripwire Zenmap

Nmap

What network testing tool can be used to identify network layer protocols running on a host? Nmap Tripwire L0phtcrack SIEM

Photograph the system.

What step should be taken after data is collected, but before equipment is disconnected, if a security breach is found on a system? Create a drive image of the system. Photograph the system. Isolate the infected system. Determine if data tampering has occurred.

integrity checking

What type of network security test would be used by network administrators for detection and reporting of changes to network systems? integrity checking penetration testing vulnerability scanning network scanning

Chief Executive Officer

Which executive position is ultimately responsible for the success of an organization? Chief Security Officer Chief Technology Officer Chief Executive Officer Chief Information Officer

Isolate the infected system.

Which initial step should be followed when a security breach is found on a corporate system? Create a drive image of the system. Photograph the system. Isolate the infected system. Establish a chain of custody.

awareness campaigns

Which security program is aimed at all levels of an organization, including end users and executive staff? educational degree programs awareness campaigns firewall implementation training courses certificate programs

vulnerability scanning

Which security test is appropriate for detecting system weaknesses such as misconfiguration, default passwords, and potential DoS targets? penetration testing vulnerability scanning network scanning integrity checkers

standards

Which type of documents help an organization establish consistency in the operations of the network by specifying criteria that must be followed? procedures guidelines standards end user policies

procedure documents

Which type of documents include implementation details that usually contain step-by-step instructions and graphics? procedure documents guideline documents standards documents end-user policy documents

procedure document

Which type of security policy document is it that includes implementation details that usually contain step-by-step instructions and graphics? procedure document guideline document standards document best practices document

technical policy

Which type of security policy includes acceptable encryption methods? governing policy technical policy acceptable use policy end-user policy

technical policy

Which type of security policy includes network access standards and server security policies? technical policy governing policy end user policy acceptable use policy


Kaugnay na mga set ng pag-aaral

Chapter 4: Validating and Documenting Data

View Set

AP World History Chapter 20: Africa and the Africans in Age of the Atlantic Slave Trade Study Questions

View Set

World of Business Chapters 7 & 8 Sample Questions

View Set