A security policy benefits an organization in what 7 ways?
Answer: (1) Provides a means to audit existing network security and compare the requirements to what is in place. (2) Plan security improvements, including equipment, software, and procedures. (3) Defines the roles and responsibilities of the company executives, administrators, and users (4) Defines which behavior is and is not allowed (5) Defines a process for handling network security incidents (6) Creates a basis for legal action if necessary (7) Enables global security implementation and enforcement by acting as a standard between sites.
Learn More :
CISCO
- What is a dictionary attack (brute force attack)?
- What command turns off DNS?
- What command explicitly sets the name server addresses?
- What are the 2 main vulnerabilities of DNS?
- What is the vulnerability of NTP?
- What is the vulnerability of SNMP?
- Between Disrupt of peers and falsification of routing information, which one is worse and why?
- What are the consequences of falsifying routing information?
- What is a payload?
- Routing Systems can be attacked in what 2 ways?
- What is the problem with Simple Network Management Protocol version 1 (SNMPv1)?
- What are the three steps to secure RIPv2 updates?
- What are two common uses of Eavesdropping?
- What uses a single command to disable non-essential system processes and services, eliminating potential security threats
- What mode automatically executes the auto secure command with the recommended Cisco default settings. This mode is enabled with the no-interact command option.
- What mode prompts you with options to enable and disable services and other security features?
- What two modes can you use auto secure in?
- You can configure Auto Secure in privileged EXEC mode using what command ?
- What 5 factors will the cisco autoscecure ask you to number?
- Misconfiguring a router traffic filter can expose what?
- A compromised route table can do what?
- A compromised Access control list can expose what?
- What security policies can be used specifically for remote access?
- What security policies can be used specifically for email?
- What are the 14 general security policies that an organization may invoke?
If the answers is incorrect or not given, you can answer the above question in the comment box. If the answers is incorrect or not given, you can answer the above question in the comment box.