Networking Security Concepts

Networking Security Concepts

Security has been important for a long time, with an increasing focus on it over the years. When LANs connecting personal computers began to emerge back in the early 1980s, security was not goal number one, and maybe not even in the top two or three when implementing a network. It was more of an afterthought. Today, however, security for corporate networks is at or near the top of the list.

One challenge to network security is that the threats to a network constantly change. You can deal with this in a couple of ways. One way is to just stick your head in the sand and hope attackers do not harm your network. An alternative approach is to design the network with the best practices for security 640-554 ebook download, and then monitor your current security and vigilantly update it.

The concept of location of data is becoming blurred by concepts of cloud computing and content-data networks and global load balancing. As we strive to empower employees around the world with ubiquitous access to important data, it is increasingly important to remain constantly vigilant about
640-554 iins syllabus protecting data and the entities using it (individuals, businesses, governments, and so on).

This chapter covers the fundamental building blocks of network security (implementing and improving), an essential topic that you are ready to master now that you better understand its importance.

“ Do I Know This Already ? ” Quiz


The “Do I Know This Already?” quiz helps you determine your level of knowledge of this chapter’s topics before you begin. Table 1-1 details the major topics discussed in this chapter and their corresponding quiz questions.

6 CCNA Security 640-554 Official Cert Guide

1 . Which security term refers to a person, property, or data of value to a company?

a . Risk
b . Asset
c . Threat prevention
d . Mitigation technique

2 . Which asset characteristic refers to risk that results from a threat and lack of a coun termeasure?

a . High availability
b . Liability
c . Threat prevention
d . Vulnerability

3 . Which three items are the primary network security objectives for a company?

a . Revenue generation
b . Confidentiality
c . Integrity
d . Availability

4 . Which data classification label is usually not found in a government organization?

a . Unclassified
b . Classified but not important
c . Sensitive but unclassified
d . For official use only
e . Secret

5 . Which of the following represents a physical control?

a . Change control policy
b . Background checks
c . Electronic lock
d . Access lists

6  What is the primary motivation for most attacks against networks today?

a . Political
b . Financial
c . Theological
d . Curiosity

7 . Which type of an attack involves lying about the source address of a frame or p a c k e t ?

a . Man-in-the-middle attack
b . Denial-of-service attack
c . Reconnaissance attack
d . Spoofing attack

8 . Which two approaches to security provide the most secure results on day one?

a . Role based
b . Defense in depth
c . Authentication
d . Least privilege

9 . Which of the following might you find in a network that is based on a defense-in-depth security implementation? (Choose all that apply.)

a . Firewall
b . IPS
c . Access lists
d . Current patches on servers

1 0 . In relation to production networks, which of the following are viable options when dealing with risk? (Choose all that apply.)

a . Ignore it
b . Transfer it
c . Mitigate it
d . Remove it

No comments: