Network Security CH. 4

¡Supera tus tareas y exámenes ahora con Quizwiz!

Consider the following access list: access list.access-list 100 permit up host 192.168.10.1 any access-list 100 deny icmp 192.168.10.0 0.0.0.255 any echo access-list 100 permit ip any any Which two actions are taken if the access list is placed inbound on a router GE port that has the IP address 192.168.10.254 assigned? (two)

-Devices on the 192.168.10.0/24 network are not allows to ping other devices on the 192.168.11.0 network -A Telnet or SSH session is allowed from any device on the 192.168.10.0 into the router with this access list assigned.

Which two rules about interfaces are valid when implementing a Zone-Based Policy Firewall? (Two)

-If neither interface is a zone member, then the action is to pass traffic -if both interfaces are members of the same zone, all traffic will be passed

The ACL statement is the only one explicitly configured on the router. Based on this information, which two conclusions can be drawn regarding remote access network connections? (Exhibit/Two)

-Telnet connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are blocked -SSH connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are allowed

When a Cisco IOS Zone-Based Policy Firewall is being configured, which two actions can be applied to a traffic class? (Two)

-drop -inspect

A router has been configured as a classic firewall and an inbound ACL applied to the external interface. Which action does the router take after inbound-to-outbound traffic is inspected and a new entery is created in the state table?

A dynamic ACL entry is added to the external interface in the inbound direction

When an inbound internet-traffic ACL is being implemented, what should be included to prevent the spoofing of internal networks?

ACEs to prevent traffic from private address spaces

The network "A" contains multiple corporate servers that are accessed by hosts from the internet for information about the corporation. What term is used to describe the network marked as "A"?`

DMZ

Which statement describes the function of the ACEs (Exhibit)

These ACEs allow for IPv6 neighbor discovery traffic

Which statement describes a typical security policy for a DMZ firewall configuration?

Traffic that originates from the DMZ interface is selectively permitted to the outside interface.

In addition to the criteria used by extended ACLs, what conditions are used by a classic firewall to filter traffic?

application layer protocol session information

What is one benefit of using a stateful firewall instead of a proxy server?

better performance

To facilitate the troubleshooting process, which inbound ICMP message should be permitted on an outside interface?

echo reply

When a Cisco IOS Zone-Based Policy Firewall is being configured via CLI, which step must be taken after zones have been created?

establish policies between zones

What is the function of the pass action on a Cisco IOS Zone-Based Policy Firewall?

forwarding traffic from one zone to another

Which command is used to activate an IPv6 ACL named ENG_ACL on an interface so that the router filters traffic prior top accessing the routing table?

ipv6 traffic-filter ENG_ACL in

What is one limitation of a stateful firewall?

not as effective with UDP- or ICMP-based traffic

Fill in the blank: The _________ action in a Cisco IOS Zone-Based Policy Firewall is similar to a permit statement in an ACL

pass

If the provided ACEs are in the same ACL, which ACE should be listed first in the ACL according to best practice?

permit udp 172.16.0.0 0.0.255.255 host 172.16.1.5 eq snmptrap

Which type of packet is unable to be filtered by an outbound ACL?

router-generated packet

which command will verify a Zone-Based Policy Firewall configuration?

show running-config

Fill in the Blank: A ___________ firewall monitors the state of connections as network traffic flows into and out of the organization

stateful

Which security tool monitors network traffic as it flows into and out of the organization and determines whether packets belong to an existing connection or are from an unauthorized source?

stateful firewall

If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address 10.0.0.3, source port 23, and destination port 2447, what does the Cisco IOS firewall do with the packet?

the packet it dropped

A network administrator is implementing a Classic Firewall and a Zone-Based Firewall concurrently on a router. Which statement best describes this implementation?

the two models cannot be implemented on a single interface

A company is deploying a new network design in which the border router has three interfaces. Int S0/0/0 connects to the ISP, GE0/0 connects to the DMZ, and GE0/1 connects to the internal private network. Which type of traffic would receive the least amount of inspection (have the most freedom of travel)?

traffic that is going from the private network to the DMZ


Conjuntos de estudio relacionados

Module #5 : Handing Complaints & Dealing With Angry People

View Set

Unit 5: Lesson 1; The French Speaking World (FRE SB)

View Set

NTR 222 - Week 12 (Quiz Questions)

View Set

PSY-103 Final Review (Chapters 14 & 8)

View Set