Home
11.
Which of the following products would be part of the secure communications component of the Cisco Self - Defending Network?
  • A.
    MARS
  • B.
    Cisco ACS server
  • C.
    ISR router
  • D.
    ASA security appliance
  • E.
    Cisco NAC
  • Answer & Explanation
  • Report
Answer : [C, D]
Explanation :
The Cisco ISR router and Adaptive Security Appliance (ASA) product both support VPN capabilities, which would qualify as secure communications.
Report
Name Email  
12.
Which is not a goal of an information security policy?
  • A.
    Identify the critical information assets.
  • B.
    Identify how the assets must be secured.
  • C.
    Identify the appropriate use of data.
  • D.
    Identify the risk to the data.
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
The three goals of an information security policy are to identify the critical information assets of an organization, how they must be secured, and the appropriate use of data and resources.
Report
Name Email  
13.
When discussing annual loss expectancy, which of the following would be described as the loss expectancy from a single threat in a given year in dollars?
  • A.
    ALE
  • B.
    SLE
  • C.
    ARO
  • D.
    LE
  • E.
    SEL
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
The loss expectancy from a single threat in a given year in dollars is the single loss expectancy, or SLE.
Report
Name Email  
14.
Which of the following is not a component of a security awareness program?
  • A.
    Awareness
  • B.
    Training
  • C.
    Education
  • D.
    Management
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
The three components of a security awareness program are awareness, training, and education.
Report
Name Email  
15.
A document specifying that encryption must be used when transferring data over the Internet would be an example of what?
  • A.
    Technical policy
  • B.
    Technical guideline
  • C.
    Governing policy
  • D.
    End - user guideline
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
The best answer to this question is a governing policy. The reason it ' s a governing policy is that it tells you encryption must be used but doesn ' t tell you what strength or type of encryption to use. A technical policy might tell you what kind of encryption to use.
Report
Name Email