Based on this configuration, and using the exhibit, select the answers that identify what the list will accomp
You are configuring the Access Lists for your new Cisco Router. The following are the commands
that are entered into the router for the list configuration.
Router(config)#access-list 55 deny 10.10.12.0 0.0.0.255
Router(config)#access-list 55 permit 0.0.0.0 255.255.255.255
Router(config)#interface E1
Router(config-if)#ip access-group 55 out
Router(config-if)#interface S0
Router(config-if)#ip access-group 55 out
Based on this configuration, and using the exhibit, select the answers that identify what the list will accomplish.
which of the following options would you use?
You are creating a new Auditing and Logging policy for your network. On a Windows 2003 system,
if you wish to audit events like access to a file, folder, or printer, which of the following options
would you use?
What is the function of this rule?
You have recently taken over the security of a mid-sized network. You are reviewing the current
configuration of the IPTables firewall, and notice the following rule:
ipchains -A output -p TCP -s 10.0.10.0/24 -d 0.0.0.0/0 80 -j ACCEPT
What is the function of this rule?
which of the following options would you use?
You are creating a new Auditing and Logging policy for your network. On a Windows 2003 system,
if you wish to audit events like the computer restarting, which of the following options would you
use?
What is the function of this rule?
You have recently taken over the security of a mid-sized network. You are reviewing the current
configuration of the IPTables firewall, and notice the following rule:
ipchains -A input -p TCP -s 0.0.0.0/0 -d 10.0.10.0/24 5000:10000 -j DENY
What is the function of this rule?
What is the Event ID for a failed attempt at Logon due to an unknown username or bad password?
You are examining the Event IDs in your Windows 2003 network. There have been a large
number of failed attempts at logon in the network. What is the Event ID for a failed attempt at
Logon due to an unknown username or bad password?
you need to edit the configuration files entry of "HOME_NET" to define which of the following?
After installing Snort on your windows machine that is destined to be your IDS, you need to edit
the configuration files entry of “HOME_NET” to define which of the following?
Which of the following techniques will allow you to restrict Telnet access as you are required?
You have a Windows Server 2003 that you have been told must be reached by the Internet.
Although you recommend against it, you are instructed to provide Telnet service to authorized
users through this server. In order to increase security by restricting access to the Telnet server,
you choose to restrict access to a single group of users. Which of the following techniques will
allow you to restrict Telnet access as you are required?
which of the following statements?
One of the firewall choices you are thinking of implementing, in your network, is a proxy server. A
proxy server can accomplish which of the following statements?
What is the Event ID for a failed attempt at Logon due to an account being disabled?
You are examining the Event IDs in your Windows 2003 network. There have been a large
number of failed attempts at logon in the network. What is the Event ID for a failed attempt at
Logon due to an account being disabled?