CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Greg Bastien; Earl Carter; Christian Degu

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید












  • Q&A


    As mentioned in the Introduction, the questions in this book are more difficult than what you should experience on the exam. The questions are designed to ensure your understanding of the concepts discussed in this chapter and adequately prepare you to complete the exam. You should use the simulated exams on the CD to practice for the exam.

    The answers to these questions can be found in Appendix A.

    1.

    Which software performs user authentication for Firewall MC and AUS?

    2.

    Which type of building block enables you to associate multiple protocols with a single name?

    3.

    What types of translation rules can you configure in Firewall MC?

    4.

    What types of access rules does Firewall MC enable you to configure?

    5.

    What types of images does AUS support?

    6.

    Which images can you not add directly through the AUS interface?

    7.

    Which type of translation rule defines a permanent mapping between private IP addresses and public IP addresses?

    8.

    What is an address translation pool?

    9.

    What is a network object?

    10.

    What are three of the device settings that you can configure through Firewall MC?

    11.

    What type of building block do you need to define to create a dynamic translation rule?

    12.

    What is workflow?

    13.

    Can AUS be used to manage firewalls that use dynamic addresses assigned by DHCP?

    14.

    What building blocks can you configure with Firewall MC, and how are they used?

    15.

    What three reports does Firewall MC support?

    16.

    Name the three possible methods from which each device setting in a managed configuration can be derived.

    17.

    What are the four steps used to import a device into Firewall MC?

    18.

    What are the steps required to add images to AUS?


    • / 191