What is the function of this rule?
You have recently taken over the security of a mid-sized network. You are reviewing the current configuration of the IPTables firewall, and notice the following rule:
ipchains -A output -p TCP -d 172.168.35.40 ! www
What is the function of this rule?
A proxy server can accomplish which of the following statements?
One of the firewall choices you are thinking of implementing, in your network, is a proxy server. A proxy server can accomplish which of the following statements?
you need to edit the configuration files entry of "HOME_NET" to define which of the following?
After installing Snort on your windows machine that is destined to be your IDS, you need to edit the configuration files entry of “HOME_NET” to define which of the following?
0/24 5000:10000 -j DENY What is the function of this rule?
You have recently taken over the security of a mid-sized network. You are reviewing the current configuration of the IPTables firewall, and notice the following rule:
ipchains -A input -p TCP -s 0.0.0.0/0 -d 10.0.10.0/24 5000:10000 -j DENY What is the function of this rule?
0/0 80 -j ACCEPT What is the function of this rule?
You have recently taken over the security of a mid-sized network. You are reviewing the current configuration of the IPTables firewall, and notice the following rule:
ipchains -A output -p TCP -s 10.0.10.0/24 -d 0.0.0.0/0 80 -j ACCEPT What is the function of this rule?
Which of the following would be the correct command to use?
You need to add a line to your IPTables Firewall input chain that will stop any attempts to use the default install of Back Orifice against hosts on your network (the 10.10.10.0 network). Which of the following would be the correct command to use?
Based on this configuration, and using the exhibit, select the answers that identify what the list will accomp
You are configuring the Access Lists for your new Cisco Router. The following are the commands that are entered into the router for the list configuration.
Router(config)#access-list 55 deny 10.10.12.0 0.0.0.255 Router(config)#access-list 55 permit 0.0.0.0 255.255.255.255 Router(config)#interface E1
Router(config-if)#ip access-group 55 out
Router(config-if)#interface S0
Router(config-if)#ip access-group 55 out
Based on this configuration, and using the exhibit, select the answers that identify what the list will accomplish.
216" as part of a rule, what does this mean?
You are reviewing your companys IPTables Firewall and see the command (minus the quotes) ” ! 10.10.216″ as part of a rule, what does this mean?
In the command ipchains -N chain , what will the -N accomplish in the chain?
In the command ipchains -N chain , what will the -N accomplish in the chain?
Which three of the following answers are used to create a protocol rule in ISA Server 2006?
During the configuration of your newly installed ISA Server 2006, you are creating new rules. Which three of the following answers are used to create a protocol rule in ISA Server 2006?