CCNA Security Exam module 4-last answer is not DMZ

10
Close Window Assessment System 1. Assessment Selection 2. Assessment Settings 3. Take Assessment Take Assessment - CCNAS Chapter 4 - CCNA Security: Implementing Network Security (Version 1.0) Time Remaining: 1 Close Window 4904043

Transcript of CCNA Security Exam module 4-last answer is not DMZ

Page 1: CCNA Security Exam module 4-last answer is not DMZ

Close Window

Assessment System

 1. Assessment

Selection    

2. Assessment Settings

   3. Take Assessment  

Take Assessment - CCNAS Chapter 4 - CCNA Security: Implementing Network Security (Version 1.0)

Time

Remaining:

1

Close Window

4904043

Page 2: CCNA Security Exam module 4-last answer is not DMZ

Refer to the exhibit. Based on the SDM screen shown, which statement describes the zone-based firewall component being configured?

a class map that inspects all traffic that uses the HTTP, IM, P2P, and email protocols

a class map that prioritizes traffic that uses HTTP first, followed by SMTP, and then DNS

a class map that denies all traffic that uses the HTTP, SMTP, and DNS protocols

a class map that inspects all traffic that uses the HTTP, SMTP, and DNS protocols

a class map that inspects all traffic, except traffic that uses the HTTP, SMTP, and DNS protocols

2

3

4

5 Which statement describes the characteristics of packet-filtering and stateful firewalls as they relate to the OSI

Page 3: CCNA Security Exam module 4-last answer is not DMZ

model?Both stateful and packet-filtering firewalls can filter at the application layer.A stateful firewall can filter application layer information, while a packet-filtering firewall cannot filter beyond the network layer.A packet-filtering firewall typically can filter up to the transport layer, while a stateful firewall can filter up to the session layer.A packet-filtering firewall uses session layer information to track the state of a connection, while a stateful firewall uses application layer information to track the state of a connection.

6 Which statement correctly describes a type of filtering firewall?A transparent firewall is typically implemented on a PC or server with firewall software running on it.A packet-filtering firewall expands the number of IP addresses available and hides network addressing design.An application gateway firewall (proxy firewall) is typically implemented on a router to filter Layer 3 and Layer 4 information.A stateful firewall monitors the state of connections, whether the connection is in an initiation, data transfer, or termination state.

7 For a stateful firewall, which information is stored in the stateful session flow table?TCP control header and trailer information associated with a particular session

TCP SYN packets and the associated return ACK packets

inside private IP address and the translated inside global IP address

outbound and inbound access rules (ACL entries)source and destination IP addresses, and port numbers and sequencing information associated with a particular session

8 Which three actions can a Cisco IOS zone-based policy firewall take if configured with Cisco SDM? (Choose three.)

inspect

evaluate

drop

analyze

pass

forward9

Refer to the exhibit. The ACL statement is the only one explicitly configured on the router. Based on this information, which two conclusions can be drawn regarding remote access network connections? (Choose two.)

SSH connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are allowed.

Telnet connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are allowed.

SSH connections from the 192.168.2.0/24 network to the 192.168.1.0/24 network are allowed.

Telnet connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are blocked.

SSH connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are blocked.

Page 4: CCNA Security Exam module 4-last answer is not DMZ

Telnet connections from the 192.168.2.0/24 network to the 192.168.1.0/24 network are allowed.10 Which type of packet is unable to be filtered by an outbound ACL?

ICMP packet

broadcast packet

multicast packet

router-generated packet11

Refer to the exhibit. In a two-interface CBAC implementation, where should ACLs be applied?inside interface

outside interface

inside and outside interfaces

no interfaces12 When configuring a Cisco IOS zone-based policy firewall, which three actions can be applied to a traffic class?

(Choose three.)drop

inspect

pass

reroute

queue

shape13 Which two parameters are tracked by CBAC for TCP traffic but not for UDP traffic? (Choose two.)

source port

protocol ID

sequence number

destination port

SYN and ACK flags14 Which location is recommended for extended numbered or extended named ACLs?

a location as close to the destination of traffic as possible

a location as close to the source of traffic as possible

Page 5: CCNA Security Exam module 4-last answer is not DMZ

a location centered between traffic destinations and sources to filter as much traffic as possible

if using the established keyword, a location close to the destination to ensure that return traffic is allowed15 Which two are characteristics of ACLs? (Choose two.)

Extended ACLs can filter on destination TCP and UDP ports.

Standard ACLs can filter on source TCP and UDP ports.

Extended ACLs can filter on source and destination IP addresses.

Standard ACLs can filter on source and destination IP addresses.

Standard ACLs can filter on source and destination TCP and UDP ports.

Showing 1 of 2 <Prev Page: Next>

Close Window

All contents copyright 1992-2010 Cisco Systems, Inc. Privacy

Assessment System

  1. Assessment Selection     2. Assessment Settings     3. Take Assessment  

1

1

Page 6: CCNA Security Exam module 4-last answer is not DMZ

Take Assessment - CCNAS Chapter 4 - CCNA Security: Implementing Network Security (Version 1.0)

Time

Remaining:

16Which zone-based policy firewall zone is system-defined and applies to traffic destined for the router or originating from the router?

self zone

system zone

local zone

inside zone

outside zone

17

Refer to the exhibit. Based on the SDM screen shown, which two statements describe the effect this zone-based policy firewall has on traffic? (Choose two.)

4933476

Page 7: CCNA Security Exam module 4-last answer is not DMZ

HTTP traffic from the in-zone to the out-zone is inspected.

Unmatched traffic to the router from the out-zone is permitted.

ICMP replies from the router to the out-zone are denied.

Traffic from the in-zone to the out-zone is denied if the source address is in the 127.0.0.0/8 range.

Traffic from the in-zone to the out-zone is denied if the destination address is in the 10.1.1.0/29 range.18 Which type of packets exiting the network of an organization should be blocked by an ACL?

packets that are not encrypted

packets that are not translated with NAT

packets with source IP addresses outside of the organization's network address space

packets with destination IP addresses outside of the organization's network address space19 When using Cisco IOS zone-based policy firewall, where is the inspection policy applied?

a global service policy

an interface

a zone

a zone pair20 In addition to the criteria used by extended ACLs, what conditions are used by CBAC to filter traffic?

TCP/IP protocol numbers

IP source and destination addresses

application layer protocol session information

TCP/UDP source and destination port numbers21

Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address 10.0.0.3, source port 23, and destination port 2447, what does the Cisco IOS firewall do with the packet?

The packet is forwarded, and an alert is generated.

The packet is forwarded, and no alert is generated.

Page 8: CCNA Security Exam module 4-last answer is not DMZ

The initial packet is dropped, but subsequent packets are forwarded.

The packet is dropped.22 When logging is enabled for an ACL entry, how does the router switch packets filtered by the ACL?

topology-based switching

autonomous switching

process switching

optimum switching23

Refer to the exhibit. What is represented by the area marked as “A”?DMZ

internal network

perimeter security boundary

trusted network

untrusted network

Showing 2 of 2 <Prev Page: Next>

Close Window

2

Page 9: CCNA Security Exam module 4-last answer is not DMZ

All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement  and  Trademarks. 2