What is a security advantage that RIPv2 provides over RIPv1?
You are going to migrate the Cisco routers in your network from RIPv1 to RIPv2. What is a security advantage that RIPv2 provides over RIPv1?
From the following, select all the access list statements that are required to make this possible
The exhibit shows a router with three interfaces E0, E1 and S0. Interfaces E0 and E1 are connected to internal networks 192.168.10.0 and 192.168.20.0 respectively and interface S0 is connected to the Internet.
The objective is to allow two hosts, 192.168.20.16 and 192.168.10.7 access to the Internet while all other hosts are to be denied Internet access. All hosts on network 192.168.10.0 and 192.168.20.0 must be allowed to access resources on both internal networks. From the following, select all the access list statements that are required to make this possible.
What is the function of the following configuration fragment?
What is the function of the following configuration fragment?
Router#configure terminal
Router(config)#line vty 0 4
Router(config-line)#transport input ssh telnet
Router(config-line)#^Z
Router#
From the following, select all the access list statements that are required to make this possible
The exhibit shows a router with three interfaces E0, E1 and S0. Interfaces E0 and E1 are connected to internal networks 192.168.10.0 and 192.168.20.0 respectively and interface S0 is connected to the Internet.
The objective is to allow only network 192.168.20.0 to access e-commerce Web sites on the Internet, while allowing all internal hosts to access resources within the internal network. From the following, select all the access list statements that are required to make this possible.
What are the IP addresses of the source and destination hosts involved in this communication?
Network Monitor was run on a Windows Server 2003. The exhibit shows the actual contents of a Network Monitor capture file.
What are the IP addresses of the source and destination hosts involved in this communication? To help you determine the two hosts, they have been outlined within the captured content.
, in the order they are sent):
As per the specifications of the RFC on TCP, identify from the list below the correct order of the Control
Bits in the TCP header from the left to the right (i.e., in the order they are sent):
Which of the following is the wildcard mask that will be used to filter your network segment?
You are a host in a network segment that has IP addresses in the range of 10.0.16.1~10.0.31.254. You need to create an access control list that will filter your segment of addresses. Which of the following is the wildcard mask that will be used to filter your network segment?
If you configure an access-list to block the following networks, what are you trying to protect against?
If you configure an access-list to block the following networks, what are you trying to protect against?
Network 127.0.0.0/8, Network 0.0.0.0/0 Network 10.0.0.0/8 Network 172.16.0.0/16, and Network 168.0.0/16.
If you have configured and implemented the following statements, what two attacks are you working towards prev
You are building custom ACLs on your routers to prevent known attacks from being successful against your network. If you have configured and implemented the following statements, what two attacks are you working towards preventing?
Router(config)#access-list 160 deny tcp any any eq 27665
Router(config)#access-list 160 deny udp any any eq 31335
Router(config)#access-list 160 deny udp any any eq 27444
Router(config)#access-list 160 deny tcp any any eq 6776
Router(config)#access-list 160 deny tcp any any eq 6669
Router(config)#access-list 160 deny tcp any any eq 2222
Router(config)#access-list 160 deny tcp any any eq 7000
If you wish to have the router work on blocking TCP SYN attacks, what do you add to the end of an ACL statemen
In order to add to your layered defense, you wish to implement some security configurations on your router. If you wish to have the router work on blocking TCP SYN attacks, what do you add to the end of an ACL statement?