Q&A
As mentioned in the introduction, "All About the Cisco Certified Security Professional Certification," you have two choices for review questions. The questions that follow next give you a bigger challenge than the exam itself by using an open-ended question format. By reviewing now with this more difficult question format, you can exercise your memory better and prove your conceptual and factual knowledge of this chapter. The answers to these questions are found in Appendix A.For more practice with exam-like question formats, including questions using a router simulator and multiple choice questions, use the exam engine on the CD-ROM.
1: | What does a good network security policy allow? |
2: | What does the network security policy define? |
3: | How does a "defense-in-depth" approach work in network security? |
4: | What is an OOB network used for in SAFE? |
5: | What can be used in place of an OOB network? |
6: | What is authentication? |
7: | What is authorization? |
8: | How does a NIDS work? |
9: | How does a host-based IPS work? |
10: | Why is deployment critical to the success of the IDS? |
11: | How is SAFE able to accommodate emerging network applications? |
12: | What are the four types of threats faced by a network? |
13: | What are internal threats? |
14: | What are external threats? |
15: | What are structured threats? |
16: | What are unstructured threats? |