Exam A
QUESTION 1
You are a decision maker in formulating your organization’s comprehensive network security policy. You accept that some tradeoffs will be required when implementing the policy but you are also smart enough to make some assumptions that will aid your decisions as to which tradeoffs are acceptable and which are not. Which of the follow-ing assumptions are true? (choose three)
A. Openness is often traded off against security.
B. Insider attacks are less damaging than external attacks.
C. Insider attacks often render technical security solutions ineffective.
D. Vendors’ recommendations for hardening a system should be ignored because they are usually incorrect.
Exam A QUESTION 1
Which consideration is important when implementing Syslogging in your network?
A. Use SSH to access your Syslog information.
B. Enable the highest level of syslogging available to ensure you log all possible event messages.
C. Log all messages to the system buffer so that they can be displayed when accessing the router.
D. Syncronize clocks on the network with a protocol such as Network Time Protocol
Correct Answer: D QUESTION 2
Which statement is true when you have generated RSA keys on your Cisco router to prepare for secure device management?
A. You must then zeroize the keys to reset secure shell before configuring other parameters.
Cisco 640-553 PDF Certification Dumps Test Easily Download For Groundbreaking Results
Exam A
Read MoreQUESTION 1
You are a decision maker in formulating your organization’s comprehensive network security policy. You accept that some tradeoffs will be required when implementing the policy but you are also smart enough to make some assumptions that will aid your decisions as to which tradeoffs are acceptable and which are not. Which of the follow-ing assumptions are true? (choose three)
A. Openness is often traded off against security.
B. Insider attacks are less damaging than external attacks.
C. Insider attacks often render technical security solutions ineffective.
D. Vendors’ recommendations for hardening a system should be ignored because they are usually incorrect.
Cisco 640-553 PDF Download: Most Reliable Cisco 640-553 PDF Study Guide And Latest Cisco 640-553 Questions
Exam A QUESTION 1
Which consideration is important when implementing Syslogging in your network?
A. Use SSH to access your Syslog information.
B. Enable the highest level of syslogging available to ensure you log all possible event messages.
C. Log all messages to the system buffer so that they can be displayed when accessing the router.
D. Syncronize clocks on the network with a protocol such as Network Time Protocol
Correct Answer: D QUESTION 2
Read MoreWhich statement is true when you have generated RSA keys on your Cisco router to prepare for secure device management?
A. You must then zeroize the keys to reset secure shell before configuring other parameters.