1: | SAFE can best be described as which of the following types of architectures?- High availability
- Redundant
- Security
- Performance
- Design
|
| 2: | Which of the following is a benefit of using modular architecture in the network design?- Modules are smaller and more manageable.
- Modules improve communication between various segments of the network.
- Modular architecture provides for an easier, more cost-effective method to secure each new service as needed as well as to integrate that service into the overall security architecture of the network.
- There is no real benefit to modular architecture in network design.
|
| 3: | What is the SAFE design philosophy?- Ensure security through hardened networks.
- Ensure security through obscurity.
- Minimize network services and harden systems to prevent a successful attack.
- Use flexible and manageable approaches to network design.
- There is no overall SAFE design philosophy.
|
| 4: | Which of the following is not a SAFE axiom?- Routers are targets.
- Networks are targets.
- Applications are targets.
- Hosts are targets.
- Network data is a target.
|
| 5: | The SAFE blueprint recommends which of the following?- Lock down Telnet access to routers.
- Use VLAN 1 for switch management.
- Update hosts to the latest patch level regardless of the consequences.
- Use authentication in routing protocols and in VTP.
- Set all user ports on switches to trunking mode.
|
| 6: | Which of the following two items describe hosts according to SAFE?- Hosts are considered some of the more secure elements on a network.
- Hosts represent the greatest security concerns for administrators.
- Locking down hosts is fairly simple to do.
- Hosts don't really represent targets on a network.
- Hosts are the most visible targets.
|
| 7: | Which of the following are IDS response methods available in Cisco IDS?- TCP reset
- ICMP error response
- UDP reset
- Shunning
- Connection interception
|
| 8: | Which of the following is true?- Out-of-band management networks utilize encrypted protocols such as SSH and SSL to protect management traffic on the production network.
- In-band management traffic does not cross the production network.
- Out-of-band management networks provide the highest level of security by separating management traffic to its own network.
- Secure, in-band management protocols include Telnet, SSH, TFTP, and SSL.
|
| 9: | What is the primary goal of a DDoS attack?- Knock a web server offline
- Gain access to a system
- Consume all bandwidth leading to a network, thereby making the target unreachable
- Redirect traffic to another site
|
| 10: | Which of the following network ranges are not private addresses?- 10.100.100.0/24
- 128.83.15.0/24
- 66.92.141.0/8
- 192.16.0.0/16
- 172.30.45.0/16
|