
module 14-18
Authored by lulynime09 apple_user
Computers
University
Used 8+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
29 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 mins • 1 pt
Refer to the exhibit. An administrator has configured a standard ACL on R1 and applied it to interface serial 0/0/0 in the outbound direction. What happens to traffic leaving interface serial 0/0/0 that does not match the configured ACL statements?
The resulting action is determined by the destination IP address and port number.
The resulting action is determined by the destination IP address.
The traffic is dropped.
The source IP address is checked and, if a match is not found, traffic is routed out interface serial 0/0/1.
2.
MULTIPLE CHOICE QUESTION
30 mins • 1 pt
When an inbound Internet-traffic ACL is being implemented, what should be included to prevent the spoofing of internal networks?
ACEs to prevent broadcast address traffic
ACEs to prevent traffic from private address spaces
ACEs to prevent ICMP traffic
ACEs to prevent SNMP traffic
ACEs to prevent HTTP traffic
3.
MULTIPLE CHOICE QUESTION
30 mins • 1 pt
Refer to the exhibit. What is the result of adding the established argument to the end of the ACE?
192.168.254.0 /23 traffic is allowed to reach any network.
Any IP traffic is allowed to reach the 192.168.254.0 255.255.254.0 network as long as it is in response to an originated request.
Any traffic is allowed to reach the 192.168.254.0 255.255.254.0 network.
Any TCP traffic is allowed to reach the 192.168.254.0 255.255.254.0 network if it is in response to an originated request.
4.
MULTIPLE CHOICE QUESTION
30 mins • 1 pt
What single access list statement matches all of the following networks?
192.168.16.0
192.168.17.0
192.168.18.0
192.168.19.0
access-list 10 permit 192.168.16.0 0.0.0.255
access-list 10 permit 192.168.16.0 0.0.3.255
access-list 10 permit 192.168.16.0 0.0.15.255
access-list 10 permit 192.168.0.0 0.0.15.255
5.
MULTIPLE CHOICE QUESTION
30 mins • 1 pt
Refer to the exhibit. The IPv6 access list LIMITED_ACCESS is applied on the S0/0/0 interface of R1 in the inbound direction. Which IPv6 packets from the ISP will be dropped by the ACL on R1?
neighbor advertisements that are received from the ISP router
HTTPS packets to PC1
ICMPv6 packets that are destined to PC1
packets that are destined to PC1 on port 80
6.
MULTIPLE SELECT QUESTION
30 mins • 1 pt
What are two characteristics of a stateful firewall? (Choose two.)
uses static packet filtering techniques
uses connection information maintained in a state table
prevents Layer 7 attacks
analyzes traffic at Layers 3, 4 and 5 of the OSI model
uses complex ACLs which can be difficult to configure
7.
MULTIPLE CHOICE QUESTION
30 mins • 1 pt
How does a firewall handle traffic when it is originating from the public network and traveling to the DMZ network?
Traffic that is originating from the public network is inspected and selectively permitted when traveling to the DMZ network.
Traffic that is originating from the public network is usually forwarded without inspection when traveling to the DMZ network.
Traffic that is originating from the public network is usually blocked when traveling to the DMZ network.
Traffic that is originating from the public network is usually permitted with little or no restriction when traveling to the DMZ network.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?