CISCO SECFND Practice Questions: CCNA Cisco Cyber Security by Nash John & Pierce Anderson
Author:Nash, John & Pierce, Anderson [Nash, John]
Language: eng
Format: mobi
Published: 2018-07-01T16:00:00+00:00
58. Which two features must a next generation firewall include? (Choose two.)
A. data mining
B. host-based antivirus
C. application visibility and control
D. Security Information and Event Management
E. intrusion detection system
Answer: C & E
Explanation: Data mining is not the requirement of firewall, Host based antivirus are either standalone or HIDS based. SIEM are generally very log and memory intensive such that usually they are standalone applications which are not part of firewall. The firewall may push its logs to SIEM to analyze.
18
59. Which of the following are metrics that can measure the effectiveness of a runbook?
A. Mean time to repair (MTTR)
B. Mean time between failures (MTBF)
C. Mean time to discover a security incident
D. All of the above
Answer: D
Explanation: All of the above are metrics used to rate the effectiveness of a runbook
60. Which of the following access control models use security labels to make access decisions?
A.
B. Mandatory access control (MAC)
C. Role-based access control (RBAC)
D. Identity-based access control (IBAC)
Answer: B
Explanation: MAC uses security labels for access decisions.
61. One of the objectives of information security is to protect the CIA of information and systems. What does CIA mean in this context?
A. Confidentiality, Integrity, and Availability
B. Confidentiality, Identity, and Availability
C. Confidentiality, Integrity, and Authorization
D. Confidentiality, Identity, and Authorization
Answer: A
Explanation: One of the basic tenants in Information security is the CIA concept which are Confidentiality, Integrity and Availability
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Deep Learning with Python by François Chollet(12638)
Hello! Python by Anthony Briggs(9946)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9818)
The Mikado Method by Ola Ellnestam Daniel Brolund(9812)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(9644)
Dependency Injection in .NET by Mark Seemann(9368)
Hit Refresh by Satya Nadella(8851)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8332)
The Kubernetes Operator Framework Book by Michael Dame(7892)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7808)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7788)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Exploring Deepfakes by Bryan Lyon and Matt Tora(7678)
Practical Computer Architecture with Python and ARM by Alan Clements(7620)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(7591)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(7590)
Robo-Advisor with Python by Aki Ranin(7574)
Building Low Latency Applications with C++ by Sourav Ghosh(7459)
Svelte with Test-Driven Development by Daniel Irvine(7440)
