CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Tebyan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید





  • Chapter 14



    A1:

    c

    A2:

    b,d,e

    A3:

    b

    A4:

    a,b,d,f

    A5:

    b

    A6:

    b

    A7:

    b,c,d,e,g

    A8:

    a

    A9:

    c

    A10:

    c

    Q&A

    1:

    What is RFC 2827 filtering?

    A1:

    RFC 2827 filtering ensures that any traffic with a source address that is not part of the organization's public address space is filtered out.

    2:

    What public services should be available to Internet users?

    A2:

    It is normal practice to allow only those specific ports that are required for a service to function. All other access should be denied. Any attempt to gain access to other public services ports should be logged.

    3:

    What is the command to implement a Cisco IOS Firewall rule set to an interface?

    A3:

    ip inspect name [in | out]

    4:

    What technique is used to perform rate limiting within the ISP router?

    A4:

    Rate limiting of traffic in the ISP router can be achieved by the use of committed access rate (CAR) filtering. This technique flags traffic to be rate limited via an ACL. Matched traffic is then rate limited according to the parameters selected in the rate-limit command.

    5:

    How do you implement RFC 1918 filtering?

    A5:

    To implement RFC 1918 filtering, the following filter rules are defined on an extended IP ACL, which is then applied to the appropriate interface:

    access-list 140 deny ip 10.0.0.0 0.255.255.255 any

    access-list 140 deny ip 172.16.0.0 0.15.255.255 any

    access-list 140 deny ip 192.168.0.0 0.0.255.255 any

    6:

    How should traffic that is flowing from the internal network to the public services segment be restricted?

    A6:

    Only the traffic that is specifically required to flow to the public services segment should be allowed. All other traffic should be explicitly denied.

    7:

    How are remote users affected in the small network when the small network is used in a branch configuration?

    A7:

    Under this circumstance, all remote connectivity is normally provided via the corporate headquarters. Consequently, all related configuration for remote user connectivity is removed from the design.

    8:

    What commands are used to implement IDS services on the PIX Firewall in the small network design?

    A8:

    ip audit name IDSinfo action alarm

    ip audit name IDSattack action alarm drop reset

    ip audit interface outside IDS

    ip audit interface inside IDS

    ip audit interface dmz IDS

    9:

    What is the importance of the isakmp key command?

    A9:

    The isakmp key command defines the preshared key to be used by the specified peer in the command.

  • / 290