Term
|
Definition
| Standard, makes decisions based on source IP address |
|
|
Term
|
Definition
| Extended, makes decisions based on Source or Dest IP/ port# |
|
|
Term
|
Definition
| Makes decisions based on source MAC address |
|
|
Term
ACLs that do not impact packets whose source is the router itself Has implicit deny at the end |
|
Definition
| Both standard and extended ACLs |
|
|
Term
| ACLs that Should be applied closest to the destination |
|
Definition
|
|
Term
| ACLs should be applied closest to the source |
|
Definition
|
|
Term
| a good use for Nmap is to... |
|
Definition
| identify open ports on a device |
|
|
Term
| Command to view the number of packets matching a given ACL entry |
|
Definition
|
|
Term
| It can be used on only extended access lists and is meant to block internet traffic except replies to TCP traffic initiated inside |
|
Definition
| TCP Keyword "established" |
|
|
Term
| Adds temporary ACL Entries (ACE) into an extended ACL that has been applied to external interface based on match of an ACE with a reflect parameter for any type of IP traffic |
|
Definition
|
|
Term
| The purpose of using an access list number on the debug ip packet command is to... |
|
Definition
| limit the packets displayed and reduce usage of system resources |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Source-quench packet-too-big echo-reply |
|
Definition
|
|
Term
| A ______ firewall makes decisions based on info about data flowing thru the firewall, and how it fits with other packets. A ____ firewall forwards or drops a packet using rules for that packet only |
|
Definition
|
|
Term
| A firewall is typically placed... |
|
Definition
| between the untrusted networks and trusted networks. |
|
|
Term
Unauthorized traffic can be tunneled as legitimate traffic Netowrk performance can slow down Many applications cannot pass through |
|
Definition
|
|
Term
| A firewall is always inserted into the network layer as a layer 3 device, T/F? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Application layer protocol session information |
|
|
Term
| When an attacker floods a server with the first part of a 3-way handshake but never completes the connections, this is called a(n)_______ attack. |
|
Definition
|
|
Term
| How does CBAC handle UDP traffic? |
|
Definition
| UDP responses are permitted within a specific time-frame |
|
|
Term
| The CBAC item that specified each desired application layer protocol to inspect and generic TCP, UDP, and ICMP if desired, is the_____ |
|
Definition
|
|
Term
| If a particular protocol passes thru the firewall rules of acceptable applications and is not listed as a permitted protocol, what will the router do? |
|
Definition
| If it passes the inbound ACL on the inbound int, and the outbound ACL on the outbound int, it will be sent on its way with no modifications to the router |
|
|
Term
| A CBAC ___ occurs when a msg is displayed concerning CBAC operations. A CBAC ___ keeps track of connections that CBAC inspects |
|
Definition
|
|
Term
| An interface in a zone cannot send traffic to any interface that is not a member of a zone, T/F? |
|
Definition
|
|
Term
| Interfaces that are members of the same zone cannnot pass traffic between them, T/F? |
|
Definition
|
|
Term
| Zone configuration steps in the correct order. |
|
Definition
Define firewall policies Create the zones Define traffic classes Assign policy maps to zone pairs Assign router interfaces to zones |
|
|
Term
Provides stateful inspection and allows return traffic Does not forward traffic Forwards traffic w/o tracking session |
|
Definition
|
|