PrepAway - Latest Free Exam Questions & Answers

Tag: Exam SCNS

Exam SCNS: SCNS Tactical Perimeter Defense

what two attacks are you working towards preventing?

You are building custom ACLs on your routers to prevent known attacks from being successful
against your network. If you have configured and implemented the following statements, what two
attacks are you working towards preventing?
Router(config)#access-list 160 deny tcp any any eq 27665
Router(config)#access-list 160 deny udp any any eq 31335

Router(config)#access-list 160 deny udp any any eq 27444
Router(config)#access-list 160 deny tcp any any eq 6776
Router(config)#access-list 160 deny tcp any any eq 6669
Router(config)#access-list 160 deny tcp any any eq 2222
Router(config)#access-list 160 deny tcp any any eq 7000

From the following, select all the access list statements that are required to make this possible.

The exhibit shows a router with three interfaces E0, E1 and S0. Interfaces E0 and E1 are
connected to internal networks 192.168.10.0 and 192.168.20.0 respectively and interface S0 is
connected to the Internet.

The objective is to allow only network 192.168.20.0 to access e-commerce Web sites on the
Internet, while allowing all internal hosts to access resources within the internal network. From the
following, select all the access list statements that are required to make this possible.

From the following, select all the access list statements that are required to make this possible.

The exhibit shows a router with three interfaces E0, E1 and S0. Interfaces E0 and E1 are
connected to internal networks 192.168.10.0 and 192.168.20.0 respectively and interface S0 is
connected to the Internet.

The objective is to allow two hosts, 192.168.20.16 and 192.168.10.7 access to the Internet while
all other hosts are to be denied Internet access. All hosts on network 192.168.10.0 and
192.168.20.0 must be allowed to access resources on both internal networks. From the following,
select all the access list statements that are required to make this possible.

From the following, select all the access list statements that are required to make this possible.

The exhibit shows a router with three interfaces E0, E1 and S0. Interfaces E0 and E1 are
connected to internal networks 192.168.10.0 and 192.168.20.0 respectively and interface S0 is
connected to the Internet.

The objective is to allow host 192.168.10.7 access to the Internet via ftp and deny access to the
Internet to everyone else while allowing them to access resources amongst themselves. From the
following, select all the access list statements that are required to make this possible.


Page 6 of 23« First...45678...20...Last »