CCNA Security - Chapter 4

Is this your test? Login to manage it. If not, you can create a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
What are two characteristics of ACLs? (Choose two.)
2.
1 point
To facilitate the troubleshooting process, which inbound ICMP message should be permitted on an outside interface?
3.
1 point
When a Cisco IOS zone-based policy firewall is being configured, which two actions can be applied to a traffic class? (Choose two.)
4.
1 point
Which command is used to activate an IPv6 ACL named ENG_ACL on an interface so that the router filters traffic prior to accessing the routing table?
5.
1 point
Which two are characteristics of ACLs? (Choose two.)
6.
1 point
For a stateful firewall, which information is stored in the stateful session flow table?
7.
1 point
permit icmp any any nd-na
permit icmp any any nd-ns
deny ipv6 any any

Refer to the exhibit. Which statement describes the function of the ACEs?
8.
1 point
When configuring a Cisco IOS zone-based policy firewall, which two actions can be applied to a traffic class? (Choose two.)
9.
1 point
Which type of packet is unable to be filtered by an outbound ACL?
10.
1 point
What is a limitation of using object groups within an access control entry?
11.
1 point
Which three statements describe zone-based policy firewall rules that govern interface behavior and the traffic moving between zone member interfaces? (Choose three.)
12.
1 point
Which statement correctly describes how an ACL can be used with the access-class command to filter vty access to a router?
13.
1 point
Class maps identify traffic and traffic parameters for policy application based on which three criteria? (Choose three.)
14.
1 point
When logging is enabled for an ACL entry, how does the router switch packets filtered by the ACL?
15.
1 point
Which two parameters are tracked by CBAC for TCP traffic but not for UDP traffic? (Choose two.)
16.
1 point
Refer to the exhibit. Which statement is true about the effect of this Cisco IOS zone-based policy firewall configuration?
17.
1 point
Which zone-based policy firewall zone is system-defined and applies to traffic destined for the router or originating from the router?
18.
1 point
Refer to the exhibit. Which Cisco IOS security feature is implemented on router FW?
19.
1 point
A router has been configured as a classic firewall and an inbound ACL applied to the external interface.
Which action does the router take after inbound-to-outbound traffic is inspected and a new entry is created in the state table.
20.
1 point
In addition to the criteria used by extended ACLs, what conditions are used by a classic firewall to filter traffic?
21.
1 point
Which statement describes a typical security policy for a DMZ firewall configuration?
22.
1 point
When an inbound Internet-traffic ACL is being implemented, what should be included to prevent the spoofing of internal networks?
23.
1 point
Refer to the exhibit. What is represented by the area marked as “A”?
24.
1 point
Which statement describes the characteristics of packet-filtering and stateful firewalls as they relate to the OSI model?
25.
1 point
Refer to the exhibit. The ACL statement is the only one explicitly configured on the router. Based on this information, which two conclusions can be drawn regarding remote access network connections? (Choose two.)
26.
1 point
What is the first step in configuring a Cisco IOS zone-based policy firewall using the CLI?
27.
1 point
When implementing an inbound Internet traffic ACL, what should be included to prevent the spoofing of internal networks?
28.
1 point
Which statement describes one of the rules governing interface behavior in the context of implementing a zone-based policy firewall configuration?
29.
1 point
When using CCP to apply an ACL, the administrator received an informational message indicating that a rule was already associated with the designated interface in the designated direction. The administrator continued with the association by selecting the merge option. Which statement describes the effect of the option that was selected?
30.
1 point
Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address 10.0.0.3, source port 23, and destination port 2447, what does the Cisco IOS firewall do with the packet?