Based on this configuration, and using the exhibit, select the answers that identify what the list will accomp
You are configuring the Access Lists for your new Cisco Router. The following are the commands
that are entered into the router for the list configuration.
Router(config)#access-list 55 deny 10.10.12.0 0.0.0.255
Router(config)#access-list 55 permit 0.0.0.0 255.255.255.255
Router(config)#interface E1
Router(config-if)#ip access-group 55 out
Router(config-if)#interface S0
Router(config-if)#ip access-group 55 out
Based on this configuration, and using the exhibit, select the answers that identify what the list will accomplish.
What is the function of this rule?
You have recently taken over the security of a mid-sized network. You are reviewing the current
configuration of the IPTables firewall, and notice the following rule:
ipchains -A output -p TCP -s 10.0.10.0/24 -d 0.0.0.0/0 80 -j ACCEPT
What is the function of this rule?
What is the function of this rule?
You have recently taken over the security of a mid-sized network. You are reviewing the current
configuration of the IPTables firewall, and notice the following rule:
ipchains -A input -p TCP -s 0.0.0.0/0 -d 10.0.10.0/24 5000:10000 -j DENY
What is the function of this rule?
you need to edit the configuration files entry of "HOME_NET" to define which of the following?
After installing Snort on your windows machine that is destined to be your IDS, you need to edit
the configuration files entry of “HOME_NET” to define which of the following?
which of the following statements?
One of the firewall choices you are thinking of implementing, in your network, is a proxy server. A
proxy server can accomplish which of the following statements?
What is the function of this rule?
You have recently taken over the security of a mid-sized network. You are reviewing the current
configuration of the IPTables firewall, and notice the following rule:
ipchains -A output -p TCP -d 172.168.35.40 ! www
What is the function of this rule?
What is the first thing you should have in place before configuring rules for your company’s firewall?
Your company has recently become security conscious and wishes to protect it’s electronic
assets.
What is the first thing you should have in place before configuring rules for your company’s
firewall?
What are some of the downsides to deciding to build a firewall rather than purchase one?
Your company has created it’s security policy and it’s time to get the firewall in place. Your group
is trying to decide whether to build a firewall or buy one. What are some of the downsides to
deciding to build a firewall rather than purchase one?
Which of the following is a potential weakness of a commercial firewall product that is installed on a hardene
Which of the following is a potential weakness of a commercial firewall product that is installed on
a hardened machine?
What are some of the benefits to purchasing a firewall rather than building one?
Your company has created it’s security policy and it’s time to get the firewall in place. Your group
is trying to decide whether to build a firewall or buy one. What are some of the benefits to
purchasing a firewall rather than building one?