PrepAway - Latest Free Exam Questions & Answers

Which two statements represent physical security guidel…

Which two statements represent physical security guidelines that should be followed during Cisco security
deployment? (Choose two.)

PrepAway - Latest Free Exam Questions & Answers

A.
Potential security breaches should be evaluated.

B.
Network equipment should be accessed remotely with Secure Socket Layer (SSL) instead of Telnet.

C.
Images should be managed using File Transfer Protocol (FTP) and Secure FTP (SFTP) instead of Trivial
File Transfer Protocol (TFTP).

D.
Simple Network Management Protocol version 3 (SNMPv3) should be used for security and privacy
features.

E.
The potential impact of stolen network resources and equipment should be assessed.

Explanation:
Potential security breaches should be evaluated and the potential impact of stolen network resources and
equipment should be assessed when designing the physical security architecture during Cisco security
deployment.
Physical security is considered during security implementation to increase the strength of the complete security
design. It helps to protect and limit access to network resources and physical network equipment. The following
physical security guidelines should be followed during Cisco security deployment:
Potential security breaches should be evaluated.
The impact of stolen network resources and equipment should be accessed.
Physical access control such as locks and alarms should be used.
To secure traffic flowing on networks outside the user control, a control mechanism such as cryptography
should be used.
All the other options are incorrect because they do not represent physical security guidelines. They deal more
with the transmission of information and the performance and security implications of that transmission rather
than the protection of physical devices.
Objective:
Infrastructure Security
Sub-Objective:
Configure, verify, and troubleshoot basic device hardening

Cisco > Articles > Network Technology > Security > General Design Considerations for Secure Networks


Leave a Reply