CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Greg Bastien; Earl Carter; Christian Degu

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید






  • "Do I Know This Already?" Quiz


    The purpose of the "Do I Know This Already?" quiz is to help you decide if you really need to read the entire chapter. If you already intend to read the entire chapter, you do not necessarily need to answer these questions now.

    The nine-question quiz, derived from the major sections in the "Foundation Topics" portion of the chapter, helps you determine how to spend your limited study time.

    1.

    Which platform does Cisco Secure ACS for Windows Version 3.2 currently support?

    1. Windows XP Professional

    2. Windows 2000 Server

    3. Windows NT Workstation

    4. Windows 2000 Professional

    2.

    What is a new feature of Cisco Secure ACS for Windows Version 3.2?

    1. A password generator

    2. A password database

    3. Additional configuration steps for your Cisco IOS Network Access Server

    4. New graphics and tables

    3.

    If you are installing Cisco Secure ACS 3.2 for Windows and do not understand a configuration option, what should you do?

    1. Check the explanation page.

    2. Push F7 for help.

    3. Select the About Cisco Secure ACS drop-down option.

    4. Open a case with Cisco TAC.

    4.

    Which of the following are not connection types for authenticating to a PIX Firewall? (Select all that apply.)

    1. Telnet

    2. SSH

    3. FTP

    4. HTTPS

    5.

    When installing Cisco Secure ACS Version 3.2 for Windows, you have the option to authenticate users against an existing user database. Which database can you check?

    1. A currently configured Cisco Secure ACS

    2. Any RADIUS server on the network

    3. The primary domain controller (PDC)

    4. The Windows user database

    6.

    What access does cut-through proxy allow a user after they have successfully authenticated?

    1. Access to anything on the network

    2. Access only to web servers

    3. Access based on the user profile (authorization)

    4. Access only to the Cisco Secure ACS

    7.

    What options are available to authenticate users on a PIX Firewall?

    1. Local user database

    2. Remote RADIUS server

    3. Remote TACACS+ server

    4. All of the above

    5. None of the above

    8.

    What technologies does the Cisco Secure ACS use to communicate with the NAS? (Choose two.)

    1. TACACS

    2. RADIUS

    3. TACACS+

    4. RADIUS+

    5. Virtual Telnet

    9.

    What does the Cisco Secure ACS consider the PIX Firewall to be (i.e., what is it referred to as, during configuration of the Cisco Secure ACS)?

    1. A perimeter security device

    2. A Network Access Server

    3. Cisco Secure ACS does not work with the PIX Firewall.

    4. None of the above

    The answers to the "Do I Know This Already?" quiz are found in Appendix A, "Answers to the ''''Do I Know This Already?'''' Quizzes and Q&A Sections." The suggested choices for your next step are as follows:


    • / 191