Created by
Terms in this set (14)
Which statement describes a typical security policy for a DMZ firewall configuration?
Traffic that originates from the outside interface is permitted to traverse the firewall to the inside interface with little or no restrictions.
Traffic that originates from the DMZ interface is selectively permitted to the outside interface.
Traffic that originates from the inside interface is generally blocked entirely or very selectively permitted to the outside interface.
Return traffic from the outside that is associated with traffic originating from the inside is permitted to traverse from the outside interface to the DMZ interface.
Return traffic from the inside that is associated with traffic originating from the outside is permitted to traverse from the inside interface to the outside interface.
Traffic that originates from the outside interface is permitted to traverse the firewall to the inside interface with little or no restrictions.
Traffic that originates from the DMZ interface is selectively permitted to the outside interface.
Traffic that originates from the inside interface is generally blocked entirely or very selectively permitted to the outside interface.
Return traffic from the outside that is associated with traffic originating from the inside is permitted to traverse from the outside interface to the DMZ interface.
Return traffic from the inside that is associated with traffic originating from the outside is permitted to traverse from the inside interface to the outside interface.
What is one difference between using Telnet or SSH to connect to a network device for management purposes?
Telnet sends data in plain text, where as SSH encrypts the data.
If you are consoled in to the router locally, there is no difference.
Telnet uses UDP and SSH uses HTTPS.
Telnet does not provide authentication whereas SSH provides authentication.
Telnet sends data in plain text, where as SSH encrypts the data.
If you are consoled in to the router locally, there is no difference.
Telnet uses UDP and SSH uses HTTPS.
Telnet does not provide authentication whereas SSH provides authentication.
A network administrator is issuing the login block-for 180 attempts 2 within 30 command on a router. Which threat is the network administrator trying to prevent?
A device that is trying to inspect the traffic on a link.
An unidentified individual who is trying to access the network equipment room.
A worm that is attempting to propagate the network.
A user who is trying to guess a password to access the router or a brute force attack.
A device that is trying to inspect the traffic on a link.
An unidentified individual who is trying to access the network equipment room.
A worm that is attempting to propagate the network.
A user who is trying to guess a password to access the router or a brute force attack.
What is the purpose of using a banner message on a Cisco network device?
It will stop attackers dead in their tracks.
It can provide more security by slowing down attacks.
It can protect an organization from a legal perspective.
It can be used to create a quiet period where remote connections are refused.
It will stop attackers dead in their tracks.
It can provide more security by slowing down attacks.
It can protect an organization from a legal perspective.
It can be used to create a quiet period where remote connections are refused.
Sets found in the same folder
Other sets by this creator
Verified questions
Other Quizlet sets
1/4