CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Greg Bastien; Earl Carter; Christian Degu

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید






  • "Do I Know This Already?" Quiz


    The purpose of the "Do I Know This Already?" quiz is to help you decide if you really need to read the entire chapter. If you already intend to read the entire chapter, you do not necessarily need to answer these questions now.

    The ten-question quiz, derived from the major sections in the "Foundation Topics" portion of the chapter, helps you determine how to spend your limited study time.

    1.

    True or false: Packet filtering can be configured on Cisco routers.

    2.

    What design feature enables the Cisco PIX Firewall to outperform conventional application firewalls?

    1. The Packet Selectivity Algorithm

    2. Super-packet filtering

    3. A single embedded operating environment

    4. Hot standby proxy processing

    3.

    True or false: Cut-through proxy technology allows users to do anything they want after authenticating at the firewall.

    4.

    What steps are required to add an ARP entry to a Cisco PIX Firewall?

    1. Edit the /etc/interfaces/outside/arp.conf file.

    2. You do not need to add an ARP entry on a PIX Firewall.

    3. Add the ARP entry using the GUI.

    4. Use the set arp command in interface config mode.

    5.

    True or false: There is no limit to the number of connections an application proxy firewall can handle.

    6.

    True or false: The Adaptive Security Algorithm requires a tremendous amount of processing by the firewall. Although the PIX Firewall is not very efficient at processing the ASA, it can handle the task.

    7.

    True or false: Redundancy allows you to configure two or more PIX Firewalls in a cluster to protect critical systems.

    8.

    Of the three firewall technologies, which one generates a separate connection on behalf of the requestor and usually operates at the upper layers of the OSI reference model?

    1. Stateful inspection

    2. Packet filtering

    3. High-speed packet filtering

    4. Application proxy

    5. None of the above

    9.

    Which of the following is not one of the three basic firewall technologies?

    1. Stateful inspection

    2. Packet filtering

    3. High-speed packet filtering

    4. Application proxy

    5. None of the above

    10.

    Which firewall technology is commonly implemented on a router?

    1. Stateful inspection

    2. Packet filtering

    3. High-speed packet filtering

    4. Application proxy

    5. None of the above

    The answers to the "Do I Know This Already?" quiz are found in Appendix A, "Answers to the ''''''''Do I Know This Already?'''''''' Quizzes and Q&A Sections." The suggested choices for your next step are as follows:


    • / 191