Shared Flashcard Set

Details

SSSE
Security Solutions for Systems Engineers
68
Engineering
Undergraduate 4
11/10/2006

Additional Engineering Flashcards

 


 

Cards

Term
Which protocol is used for transporting the event data from Cisco IPS 5.0 and later devices to the Cisco Security MARS appliance?
Definition
SDEE over SSL
Term
What type of attack is learning about a target network?
Definition
Reconnaissance attack
Term
What type of attack is it to make a system unavailable for normal use.
Definition
Denial of Service (DoS)
Term
What type of attack is it to try and escalate your privilege level?
Definition
Access Attack
Term
What types of attacks target vulnerabilities of end-user workstations
Definition
Worms, viruses and Trojan horses.
Term
Which Cisco security product provides a security audit wizard?
Definition
Cisco Router and Security Device Manager
Term
How is the Cisco IOS Control Plane Policing achieved?
Definition
by applying a QoS policy in control plane configuration mode
Term
Which component of the Cisco NAC framework is responsible for compliance and policy enforcement?
Definition
Cisco secure ACS server
Term
What is a benefit of Cisco Integrated Services Routers?
A. Intel Xeon CPU
B. built in event correlation engine
C. built in encryption acceleration
D. customer programmable ASIC
Definition
C. built in encryption acceleration
Term
What are three functions of CSA in helping to secure customer environments?
A. application control
B. control of executable content
C. identification of vulnerabilities
D. probing of systems for compliance.
E. real-time analysis
Definition
A. application control
B. control of executable content
F. System hardening
Term
Which two features can the USB etoken
for Cisco Integrated Service
Routers be used for?
A. distribution and storage of VPN credentials
B. command authorization
C. one-time passwords
D. secure deployment of configurations
E
Definition
A. distribution and storage of VPN credentials
D. secure deployment of configurations
Term
What is the benefit of IPSec + GRE?
Definition
full support of dynamic routing protocols
Term
Which two are true about Cisco Autosecure?
A. blocks all IANA-reserved IP address blocks.
B. enables identification service
C. enables log messages to include sequence numbers and time stamps
D. disables tcp keepalives
E. removes
Definition
A. blocks all IANA-reserved IP address blocks
C. enables log messages to include sequence numbers and time stamps
Term
Which two statements about the Firewall Services Module are true?
Definition
D. Up to 1 million simultaneous connections are possible
E. up to 1000 Separate contexts are possible.
Term
After powering up a MARS appliance, what is a valid task?
A. Use a cat 5 crossover cable to connect to MARS eth1 port
B. Connect a keyboard and monitor directly to the MARS appliance to set up its initial configuration
Definition
B. Connect a keyboard and monitor directly to the MARS appliance to set up its initial configuration.
Term
Which Cisco security product is an easily deployed software solution that can automatically detect, isolate, and repair infected or vulnerable devices that attempt to access the network?
Definition
NAC appliance (Cisco Clean Access)
Term
What is the benefit of the high-performance AIM that is included with Cisco Integrated Services Routers?
Definition
hardware-based encryption and compression
Term
In the context of Cisco NAC, what is a network access device?
Definition
Cisco IOS router
Term
How does CSA protect endpoints?
Definition
uses file system, network, registry and execution space interceptors to stop malicious activity.
Term
Which two should be included in an analysis of a Security Posture Assessment? A. detailed action plan
B. identification of bottlenecks in the network
C. identification of critical deficiencies
D. recommendation based on security best pract
Definition
C. identification of critical deficiencies
D. recommendation based on security best practice.
Term
Network security is a continuous process that is built around what?
Definition
Corporate Security Policy
Term
What feature of the Cisco IOS adaptive threat defense performs Application Security?
Definition
Application Security and control
Term
What feature of the Cisco IOS adaptive threat defense performs Anti-X?
Definition
Enhanced Inline IPS
Term
What feature of the Cisco IOS adaptive threat defense performs Containment and Control?
Definition
Network Foundation Protection
Term
Which rule type allows for false positive tuning?
Definition
Drop rules
Term
Which rule types are pushed down from a Global controller?
Definition
Global inspection rules
Term
Which rule types are custom inspection rules that you desire?
Definition
User inspection rules
Term
Which rule types are out-of-the-box rules provided with Cisco Security MARS?
Definition
system inspection rules
Term
Which are two functions of Cisco Security Agent? A. authentication
B. control of executable content
C. resource protection
D. spam filtering
E. user tracking
Definition
B. control of executable content
C. resource protection.
Term
In which two ways can a Security Posture Assessment help organizations to understand network threats and risks? A. by coaching system administrators
B. by identifying bottlenecks
C. by identifying vulnerable systems
D. by recommending area
Definition
C. by identifying vulnerable systems
D. by recommending areas to improve
Term
Self-Defending network is the Cisco vision for security systems. What is the purpose of the Cisco ACS server?
Definition
identity management
Term
Which two are valid arguments that you can use to convince a business decision maker of the need for network security?
Definition
B. Cisco products can provide end-to-end network protection against current and emerging threats.
E. Organizations that operate vulnerable networks face increasing liabilities
Term
What is the main reason for customer's to implement the Cisco Detector and Guard solution?
Definition
as DDoS protection system
Term
Which two statements are true about symmetric key systems? A. It uses secret-key cryptography.
B. Encryption and Decryption use different keys
C. It is typically used to encrypt the content of a message
D. RSA is an example of public key e
Definition
A. It uses secret-key cryptography.
C. It is typically used to encrypt the content of a message.
Term
What allows Cisco Security Agent to block malicious behavior before damage can occur?
Definition
interception of operating system calls
Term
When implementing a Cisco Integrated Services Router, which feature would you apply to achieve application security?
Definition
Context-based access control
Term
Which statement is true about the built-in hardware encryption that is included with Cisco Integrated Services Routers?
A. It supports SRTP
B. It supports 256 bit AES
C. It is two times faster than previous models
D. It stores VPN cred
Definition
B. It supports 256 bit AES
Term
Which combination of authentication server and authentication protocol best implements command authorization for tighter control of user access rights?
A. Cisco Secure ACS server and RADIUS
B. Cisco Secure ACS server and TACACS+
C. Microsof
Definition
B. Cisco Secure ACS server and TACACS_
Term
What is a feature of functions of Cisco Security MARS?
A. enforces authorization policies and privileges.
B. determines security incidents based on device messages, events and sessions.
C. configures, monitors and troubleshoots Cisco securi
Definition
B. determines security incidents based on device messages, events and sessions
Term
What are the two main reasons for customers to implement Cisco Clean Access?
Definition
A. enforcement of security policies by making compliance a condition of access.
F. implementation of NAC phase 1.
Term
What is the purpose of SNMP community strings when adding reporting devices into a newly installed Cisco Security MARS appliance?
Definition
To discover and display the full topology.
Term
What could be a reason to implement Cisco Security Agent?
A. preventing day zero attacks
B. communicating the host posture validation to a policy server
C. tracking the internet usage of employees
D. validating policy compliance
Definition
A. preventing day zero attacks
Term
What are two parts of the network security lifecycle?
A. Purchase
B. Operate
C. Integrate
D. Design
E. Develop
Definition
B. Operate
D. Design
Term
On the Cisco Security MARS appliance, what is used to facilitate the management of Event, IP, Service and User management?
Definition
Groups
Term
Which two features work together to provide Anti-X defense?
A. enhanced application inspection engines
B. enhanced security state assessment.
C. Cisco IPS version 5.0 technology
D. network security event correlation
E. Cisco IOS a
Definition
A. enhanced application inspection engines
C. Cisco IPS version 5.0 technology
Term
Which three components should be included in a security policy?
A. identification and authentication policy
B. incident handling procedure
C. security best practice
D. security product recommendation
E. software specifications
Definition
A. identification and authentication policy
B. incident handling procedure
F. statement of authority and scope
Term
Which statement is true about Cisco Security MARS global controller?
Definition
B. The Global controller centrally manages a group of Local Controllers
Term
Which Cisco IOS feature uses multipoint GRE and the Next Hop Resolution protocol to create dynamic IPSec tunnels between spoke sites?
Definition
DMVPN
Term
When a FWSM is operating in transparent mode, what is true?
A. Each interface must be on the same VLAN
B. The FWSM does not support multiple security contexts
C. Each directly connected network must be on the same subnet
Definition
C. Each directly connected network must be on the same subnet
Term
Which three are included with the Cisco Security Agent?
A. Buffer overflow protection
B. Day zero virus and worm protections
C. Cisco easy VPN Client
D. host-based intrusion protection.
E. plug in interface to query posture provid
Definition
A. Buffer overflow protection
B. Day zero virus and worm protections
D. host-based intrusion protection
Term
What is a valid step when setting up the Cisco Security MARS appliance for data archiving?
A. Specify the remote CIFS server.
B. Specify the remote FTP server.
C. Specify the remote NFS server.
D. Specify the remote TFTP server
Definition
C. Specify the remote NFS server.
Term
Which two components should be included in a network design document?
A. complete network blueprint
B. configuration for each device
C. detailed part list
D. operating expense
E. risk analysis
Definition
A. Complete network blueprint
C. detailed parts list
Term
Which two components should be included in a detailed design document?
A. data source
B. existing network infrastructure
C. organization chart
D. proof of concept
E. vendor availability
Definition
B. existing network infrastructure
D. proof of concept
Term
Identify two ways to create a long-duration query on the Cisco Security MARS appliance.
A. by modifying an existing report.
B. by saving a query as a report
C. by submitting a query in line
D. by submitting a batch query
E. by sa
Definition
A. by modifying an existing report
D. by submitting a batch query
Term
What are two main security drivers?
Definition
1. Compliance with company policy
2. security legislation
Term
In which two ways does 802.1x benefit businesses in terms of trust and identity?
Definition
A. allows a user-based policy to be dynamically applied to switched ports
C. prevents any unauthorized device from connecting.
Term
Which three should be included in a system acceptance test plan?
A. features to be tested
B. indications of references
C. pass and fail criteria
D. product data sheets
E. recommended changes
F. resource requirements and sched
Definition
A. features to be tested
C. pass and fail criteria
F. resource requirements and schedule
Term
What are two beneficial functions of the Cisco VPN/Security Management solution?
Definition
D. provides functions for monitoring and troubleshooting the health and performance of security devices.
E. performs real time monitoring of site-to-site VPN, remote-access VPN, firewall and IPS services.
Term
Which two are valid methods for adding reporting devices into the Cisco Security MARS appliance?
A. running an import wizard.
B. importing the devices from CiscoWorks
C. loading the devices from a seed file.
D. running manual configuration
E. using C
Definition
C. loading the devices from a seed file
D. running manual configuration
Term
What is a valid way of verifying a network security design?
Definition
pilot or prototype network.
Term
Which IPS feature models worm behavior and correlates the specific time between events, network behavior, and multiple exploit behavior to more accurately identify and stop worms?
Definition
Meta Event Generator
Term
In which two ways do Cisco ASA 5500 Series Adaptive Security Appliances achieve Containment and Control?
Definition
1. By preventing unauthorized network access?
2. by tracking the state of all network communications.
Term
Which three are functions of Cisco Security Agent?
A. spyware and adware protection
B. device-based registry scans
C. malicious mobile code protections
D. local shunning
E. protection against buffer overflows
F. flexibility a
Definition
B. device-based registry scans
C. malicious mobile code protections
E. protection against buffer overflows
Term
Which Cisco security product can be used to perform a Security Posture assessment of client workstations?
Definition
Cisco Trust agent
Term
How can you configure a Cisco security MARS appliance to send notifications via e-mail, pager, syslog, SNMP or SMS?
Definition
by defining the rule "Action"
Term
What are three advantages of Cisco Security MARS?
A. performs automatic mitigation on Layer 2 devices
B. ensures that the user device is not vulnerable
C. fixes vulnerable and infected devices automatically
D. provides rapid profile-ba
Definition
A. performs automatic mitigation on Layer 2 devices.
E. is network topology aware
F. contains scalable, distributed event analysis architecture.
Term
Which three Cisco security products help to prevent application misuse and abuse
Definition
A. Cisco ASA 5500 Series Adaptive Security Appliance
D. Cisco security agent
F. Cisco IOS FW and IPS
Term
By providing a detailed inspection of traffic in Layers 2 through 7, the Cisco IPS appliance offers which benefit to customers?
Definition
D. prevention of protocol misuse
Supporting users have an ad free experience!