Which function can be implemented by the Cisco Security Agent data access control feature?
Which function can be implemented by the Cisco Security Agent data access control feature?
Which item is correct about the relationship between the security risk management related term and its proper
Which item is correct about the relationship between the security risk management related term and its proper definition?
1.asset
2.threat
3.vulnerability
4.risk
(a) anything that has value to an organization
(b) A weakness in a system or its design that could be exploited
(c) The likelihood of a particular attack occurring and resulting in an undesirable consequence
(d) Any circumstance or event with the potential to cause harm to an information system
Which option is correct about the relationship between the malware type and its description?
Which option is correct about the relationship between the malware type and its description?
1. virus
2. worms
3. botnets
4. spyware
5. Trojan horses
6. rootkits
(a) collection of compromised computers under a common command-and-control infrastructure
(b) typically used to monitor user actions
(c) autonomously spreads to other systems without user interaction
(d) malware that hides through evasion of the operating system security mechanisms
(e) requires some user action to infect the system
(f) malware that hides inside anoter legitimate looking application
Which items are the most common methods used for managing risk?
Which items are the most common methods used for managing risk?
algorithms?
For the following items, which two are differences between symmetric and asymmetric encryption
algorithms? (Choose two.)
Enterprise Internet Access protection?
Which primary security design components should be addressed while performing
Enterprise Internet Access protection? (Not all design components are required.)
1. resource separation
2. network infrastructure device hardening
3. network signaling protection
4. boundary access control
5. compliance assessment
6. endpoint protection
Which of these items is a feature of a system-level approach to security management?
Which of these items is a feature of a system-level approach to security management?
events aggregation?
Which functionality can be used by the Cisco Security MARS security appliance to achieve
events aggregation?
Which one of the following methods can be used to scale Cisco Security MARS deployments?
Which one of the following methods can be used to scale Cisco Security MARS deployments?
which alternative Cisco IOS method is available if GRE-over-IPsec tunnels could not be used?
While performing point-to-point secure WAN solutions over the Internet, which alternative Cisco IOS method is available if GRE-over-IPsec tunnels could not be used?