Based on this configuration, and using the exhibit, select the answers that identify what the list will accomp
You are configuring the Access Lists for your new Cisco Router. The following are the commands
that are entered into the router for the list configuration.
Router(config)#access-list 131 deny tcp 10.10.0.0 0.0.255.255 0.0.0.0 255.255.255.255 eq 23
Router(config)#access-list 131 permit ip 0.0.0.0 255.255.255.255 0.0.0.0 255.255.255.255
Router(config)#interface Serial 0
Router(config-if)#ip access-group 131 out
Based on this configuration, and using the exhibit, select the answers that identify what the list will accomplish.
Based on this configuration, and using the exhibit, select the answers that identify how the router will deal
You are configuring the Access Lists for your new Cisco Router. The following are the commands
that are entered into the router for the list configuration.
Router(config)#access-list 171 permit tcp 10.10.0.0 0.0.255.255 any eq 80
Router(config)#access-list 171 deny tcp 0.0.0.0 255.255.255.255 10.10.0.0 0.0.255.255 eq 80
Router(config)#access-list 171 deny tcp any any eq 23
Router(config)#access-list 171 permit tcp 10.10.0.0 0.0.255.255 any eq 20
Router(config)# access-list 171 permit tcp 10.10.0.0 0.0.255.255 any eq 21
Based on this configuration, and using the exhibit, select the answers that identify how the router
will deal with network traffic.
Which of the following benefits does L2TP (with IPSec) provide?
You are configuring a L2TP solution between your office and your primary branch office. The CEO
has requested a report on the benefits of using this technology. Which of the following benefits
does L2TP (with IPSec) provide?
Which of the following answers presents a legitimate combination for encryption and integrity in the IPSec pol
As you analyze the settings of the Secure Server (Require Security) IPSec policy in Windows
Server
2003, you are looking at the options available for encryption and integrity. Which of the following
answers presents a legitimate combination for encryption and integrity in the IPSec policy?
What are these three default options?
You are configuring a new custom IPSec policy on your Windows Server 2003 machine. On the
rules tab, you find the three default options under the IP Filter List. What are these three default
options?
what protocol ID would IP identify with AH?
During an analysis of your IPSec implementation, you capture traffic with Network Monitor. You
are verifying that IP is properly identifying AH. When you look into IP, what protocol ID would IP
identify with AH?
what transport and tunnel modes protect using IPSec?
You are designing a new IPSec implementation for your organization, and are trying to determine
your security needs. You need to clearly understand the implementation choices, before you make
any changes to the network. Which of the following describes what transport and tunnel modes
protect using IPSec?
which implementation would meet your needs?
If you wish to implement IPSec between two branch offices of your organization, and wish for this
to include the encryption of the full packet, which implementation would meet your needs?
What are the three default IPSec policies in Windows Server 2003?
In your current organization, you have been given the task of implementing the IPSec solution. All
your servers are running Windows Server 2003, so you wish to use the built in policies. What are
the three default IPSec policies in Windows Server 2003?
What is the internetwork environment that connects the VPN Client to the VPN Server called?
You have clients that are connected to your network via a VPN. What is the internetwork
environment that connects the VPN Client to the VPN Server called?