6.2.13 Practice Questions
Which of the following are specific to extended Access control lists? (Select two.)
-Are the most used type of ACL -Use the number 100-199 and 2000-2699
Which of the following are true about routed firewalls? (Select two.)
-Count as a router hop -Supports multiple interfaces
Which of the following are characteristics of a packet-filtering firewall? (Select two.)
-Filters IP address and port -Stateless
How should you place devices on the network to best protect the servers? (Select two.)
-Put the database server on the private network -Put the web server inside the screened subnet
Your company has an internet connection. You also have a web server and an email server that you want to make available to your internet users, and you want to create a screened subnet for these two servers. Which of the following should you use?
A network-based firewall
However, when you enable the ACL, you find that no traffic is being allowed through the WAN interface. What should you do?
Add a permit statement to the bottom of the access list.
Which of the following describes how access control lists can improve network security?
An access control list filters traffic based on the IP header information, such as source or destination IP address, protocol, or socket number
Which of the following BEST describes a stateful inspection?
Determines the legitimacy of traffic based on the state of the connection from which the traffic originated
Which of the following is a firewall function?
Packet filtering
Which of the following combines several layers of security services and network functions into one piece of hardware?
Unified Threat Management (UTM)