what do you add to the end of an ACL statement?
In order to add to your layered defense, you wish to implement some security configurations on
your router. If you wish to have the router work on blocking TCP SYN attacks, what do you add to
the end of an ACL statement?
What is the aim of a unit test?
What is the aim of a unit test?
what two attacks are you working towards preventing?
You are building custom ACLs on your routers to prevent known attacks from being successful
against your network. If you have configured and implemented the following statements, what two
attacks are you working towards preventing?
Router(config)#access-list 160 deny tcp any any eq 27665
Router(config)#access-list 160 deny udp any any eq 31335
Router(config)#access-list 160 deny udp any any eq 27444
Router(config)#access-list 160 deny tcp any any eq 6776
Router(config)#access-list 160 deny tcp any any eq 6669
Router(config)#access-list 160 deny tcp any any eq 2222
Router(config)#access-list 160 deny tcp any any eq 7000
Is the checklist created to determine the test basis dependent on the selected test design technique?
Is the checklist created to determine the test basis dependent on the selected test design
technique?
what are you trying to protect against?
If you configure an access-list to block the following networks, what are you trying to protect
against?
Network 127.0.0.0/8, Network 0.0.0.0/0 Network 10.0.0.0/8 Network 172.16.0.0/16, and Network
168.0.0/16.
How many test situations are produced when the coverage type paths with test depth level 2 is used?
Which of the following is the wildcard mask that will be used to filter your network segment?
You are a host in a network segment that has IP addresses in the range of 10.0.16.1~10.0.31.254.
You need to create an access control list that will filter your segment of addresses. Which of the
following is the wildcard mask that will be used to filter your network segment?
Which TMap phase may be located on the critical path?
Which TMap phase may be located on the critical path?
What are the IP addresses of the source and destination hosts involved in this communication?
Network Monitor was run on a Windows Server 2003. The exhibit shows the actual contents of a
Network
Monitor capture file.
What are the IP addresses of the source and destination hosts involved in this communication? To
help you determine the two hosts, they have been outlined within the captured content.
identify from the list below the correct order of the Control Bits in the TCP header from the left to the righ
As per the specifications of the RFC on TCP, identify from the list below the correct order of the
Control
Bits in the TCP header from the left to the right (i.e., in the order they are sent):