Term
|
Definition
| Cisco's firewall appliances |
|
|
Term
| Connection objects are maintained in what table? |
|
Definition
| stateful session flow table |
|
|
Term
| tcp seq numbers are tracked as part of a connection object? T/F |
|
Definition
|
|
Term
OSFP routing IDS VPNs Failover VLANs NAT SNMP Cut-thru proxy auth Packet filtering EIGRP routing |
|
Definition
| funcitons performed by cisco security appliance |
|
|
Term
| to enforce access control policies between networks |
|
Definition
| Primary purpose of a firewall |
|
|
Term
| Has a lower security level than another interface |
|
Definition
|
|
Term
| The mode that permits one to change config |
|
Definition
|
|
Term
| Has a higher security level than another interface |
|
Definition
|
|
Term
| Maintains security perimiters between networks |
|
Definition
| Adaptive Security Algorithm |
|
|
Term
| Mode that enables one to update an image or perform password recovery |
|
Definition
|
|
Term
| Proprietray OS of a cisco security appliance |
|
Definition
|
|
Term
| Mode accessed by entering the enable password, and uses # prompt |
|
Definition
|
|
Term
| Mode that is obtained by accessing the device and uses > prompt |
|
Definition
|
|
Term
| An interface name that has no automatically assigned securiyt level |
|
Definition
|
|
Term
Interface name that is typically assigned to e0 or fa0 Interface name automatically assigned a security level of 0 |
|
Definition
|
|
Term
Interface name automatically assigned a security level of 100 Int name that is typically assigned to e1 or fa1 |
|
Definition
|
|
Term
| A request initiated by an interface with a security level of 90 to an int with a sec level of 40 |
|
Definition
|
|
Term
| A response to a request from an interface with a security level of 90 to an interface with a security level of 40. (Assume the request was permitted.) |
|
Definition
|
|
Term
| A request initiated by an interface with a security level of 50 to an interface with a security level of 60. |
|
Definition
|
|
Term
| A response to a request from an interface with a security level of 40 to an interface with a security level of 90. (Assume the request was permitted.) |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| creates name for an interface |
|
|
Term
|
Definition
| sets a security level for an int |
|
|
Term
|
Definition
|
|
Term
|
Definition
| sets which local addresses may use NAT and from which interfaces |
|
|
Term
|
Definition
| sets which global addresses will be used for NAT and on which interfaces |
|
|
Term
|
Definition
| Sets a specific local to global address translation for a dev |
|
|
Term
|
Definition
| sets a specific static IP route |
|
|
Term
|
Definition
|
|
Term
|
Definition
| save running config to startup config |
|
|
Term
| A single response is permitted within a specific timeframe |
|
Definition
| how is a udp request handled as a connection object in a CSA |
|
|
Term
What will happen based on the following NAT statements? nat-control global (outside) 1 150.12.16.4 netmask 255.255.255.0 global (dmz) 2 147.16.5.14-147.16.5.20 netmask 255.255.255.0 nat (inside) 1 10.0.0.0 255.255.255.0 |
|
Definition
| The LAN computers can access the Internet, but not the devices on the dmz. |
|
|
Term
| nat (inside) 0 200.100.50.10 255.255.255.0 |
|
Definition
| most correct method to config a server to use same inside and outside address |
|
|
Term
What is the global address for this device after the following command is configured? static (inside, outside) 200.100.50.10 199.47.41.10 netmask 255.255.255.0 |
|
Definition
|
|
Term
Which of the below best describes what will happen if the following statement is entered on a Cisco security appliance? route inside 188.31.10.0 255.255.0.0 188.31.10.55 1 |
|
Definition
| Traffic to the 188.31.10.0/24 subnet will be sent to the fa1 interface and addressed to 188.31.10.55. |
|
|
Term
TCP ICMP IP broadcast IP unicast UDP IP multicast |
|
Definition
| supported protocols on CSA |
|
|
Term
| Authenticating users prior to permitting their packets to be sent to any other dev's on the internal networks |
|
Definition
| Cut-thru proxy authentication |
|
|
Term
| an advantage to using CSACS and AAA over other authentication servers is? |
|
Definition
| It is the only server that can download ACLs on a per-user or per-group basis |
|
|
Term
| whatis the primary purpose of ACLs on a CSA |
|
Definition
| To override the default security appliance security level policies on any interface |
|
|
Term
|
Definition
| compiled and stored ACL in machine language code to make it faster to use, must be over 19 lines in length |
|
|
Term
| A separate server that tells the firewall whether or not to permit an action based on a URL |
|
Definition
| What is a URL filtering server? |
|
|
Term
| The firewall looks at the application level command to be issued inside the packet payload and decides wheterh or not to permit the packet |
|
Definition
|
|
Term
| Denying which type of ICMP traffic could impact IPSec VPNs? |
|
Definition
|
|