iptables

iptables

12th Grade

13 Qs

quiz-placeholder

Similar activities

Direcciones IP v4

Direcciones IP v4

10th - 12th Grade

13 Qs

JSPS Competition Hackathon - Scratch Language - Grade 1

JSPS Competition Hackathon - Scratch Language - Grade 1

2nd Grade - University

10 Qs

Bài 2-Vai trò của thiết bị thông minh và tin học đối với xã hội

Bài 2-Vai trò của thiết bị thông minh và tin học đối với xã hội

10th - 12th Grade

10 Qs

Warstwa transportowa

Warstwa transportowa

12th Grade

17 Qs

KTTX3 - K12

KTTX3 - K12

12th Grade

10 Qs

Tin 8/1

Tin 8/1

KG - University

10 Qs

Основные теги THML

Основные теги THML

12th Grade

15 Qs

Ulangan harian 1 Algoritma dan Pemrograman

Ulangan harian 1 Algoritma dan Pemrograman

12th Grade - University

13 Qs

iptables

iptables

Assessment

Quiz

Computers

12th Grade

Practice Problem

Medium

Created by

Botond Papp

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

$ iptables -t nat -A POSTROUTING -s 10.0.0.0/8 -o eth2 -j SNAT --to-source 192.168.1.10

Adds a rule that allows all traffic from 10.0.0.0/8 to the internet through eth2, translating the source IP.

Inserts a new NAT rule to alter the source IP for outgoing packets from the specified range.

Appends a rule to track connections initiated from the internal network to the external network.

Modifies existing rules to ensure outgoing packets from the internal network have a consistent source IP.

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

$ iptables -I INPUT 1 -p tcp --dport 443 -j ACCEPT

Adds an exception for all TCP packets on port 443 to bypass the existing firewall rules.

Places a new rule at the top to allow HTTPS traffic, regardless of other existing rules.

Modifies the first existing rule for TCP traffic to allow connections on port 443.

Inserts a new rule that accepts TCP traffic on port 443 only if it's established.

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

$ iptables -R FORWARD 2 -s 192.168.1.0/24 -d 10.1.1.0/24 -j DROP

Replaces an existing rule with a new rule that drops all traffic between the specified subnets.

Deletes the second rule and allows all traffic from 192.168.1.0/24 to 10.1.1.0/24.

Alters the behavior of the second rule to restrict traffic instead of allowing it.

Updates the second rule to restrict only new connections while allowing established ones.

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

$ iptables -D INPUT -p icmp -j DROP

Removes a rule that permits ICMP packets, allowing ping requests.

Deletes a blocking rule for ICMP, enabling all types of ICMP traffic.

Modifies the existing rule to accept only echo reply packets for ICMP.

Removes a rule that allows ICMP packets from specific networks.

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

$ iptables -t nat -I PREROUTING 1 -d 203.0.113.5 -p tcp --dport 80 -j DNAT --to-destination 10.0.0.2:8080

Forwards traffic from the external IP to an internal server, placing this rule at the very top of the chain.

Blocks all incoming traffic to the specified external IP and port.

Alters the existing rule to allow only HTTPS traffic to the specified internal server.

Appends a new rule to forward HTTP traffic but only for connections that are already established.

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

$ iptables -A FORWARD -i eth1 -o eth0 -p udp --dport 53 -j ACCEPT

Accepts incoming UDP traffic on port 53 and logs it for monitoring.

Allows all forwarded UDP packets on port 53 between eth1 and eth0 interfaces.

Inserts a rule to drop all packets that are not DNS queries on port 53.

Appends a rule to forward DNS queries only from the eth0 interface to the internal network.

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

$ iptables -t nat -R OUTPUT 3 -d 192.0.2.0/24 -j DNAT --to-destination 10.0.0.5

Deletes the third rule and adds a new NAT rule to direct traffic to a specific internal IP.

Replaces the third rule to modify traffic destined for the 192.0.2.0/24 network.

Alters the existing rule to log all incoming requests to 10.0.0.5 for auditing purposes.

Inserts a new rule for DNAT at the third position in the OUTPUT chain.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?