1: | Which of the following module(s) is not part of the "SAFE: Extending the Security Blueprint to Small, Midsize, and Remote-User Networks" blueprint?- Campus module
- E-Commerce module
- Corporate Internet module
- WAN module
- Management module
|
2: | Which of the following functions is not provided by the Layer 3 switch in the medium-sized network Campus module?- Routing and switching of production and management traffic
- Distribution layer services such as routing, quality of service (QoS), and access control
- Connectivity for the corporate and management servers
- Firewall protections between VLANs
- Traffic filtering between subnets
|
3: | What does RFC 2827 cover in terms of network security?- RFC 2827 describes the address ranges for private networks.
- RFC 2827 provides for the routing of VLAN traffic across a distribution switch.
- RFC 2827 describes filtering to help reduce the risk of attack through source address spoofing.
- RFC 2827 describes the process of setting up a connection between two systems using TCP.
- RFC 2827 defines OSPF version 2.
|
4: | What is the function of private VLANs in the SAFE blueprint and where are they implemented?- Private VLANs are used to help mitigate the risk associated with the exploitation of trust relationships, and they are implemented at the Layer 3 core switch.
- Private VLANs are used to help mitigate the risk associated with VLAN hopping attacks, and they are implemented at the Layer 2 core switch.
- Private VLANs are used to help mitigate the risk associated with VLAN hopping attacks, and they are implemented at the Layer 3 core switch.
- Private VLANs are used to help mitigate the risk associated with the exploitation of trust relationships, and they are implemented at the Layer 2 distribution switches.
|
5: | What is the purpose of the NIDS in the medium-sized Campus module?- To detect attacks originating from outside the Campus module that may result from a workstation compromised by an unauthorized dial-in modem or attacks from viruses, worms, or disgruntled employees.
- To detect attacks originating from within the Campus module that may result from a workstation compromised by an unauthorized dial-in modem or attacks from viruses, worms, or disgruntled employees.
- To detect attacks originating from within the Campus module that may result from a workstation compromised by an attacker gaining access through the Internet.
- To detect attacks originating from outside the Campus module that may result from a workstation compromised by an attacker gaining access through the Internet.
- The medium-sized network Campus module does not include a network intrusion detection appliance.
|
6: | The ISP router is considered to be owned and managed by which of the following?- Owned by the ISP and managed by the ISP
- Owned by the ISP and managed by the customer
- Owned by the customer and managed by the ISP
- Owned by the customer and managed by the customer
|
7: | What is the primary purpose of the private VLANs in the medium-sized network Corporate Internet module?- To provide traffic segmentation for remote systems that are terminating their IPSec tunnels on the VPN concentrator
- To mitigate trust exploitation attacks
- To improve bandwidth outside of the firewall in the module
- To facilitate the use of an IDS in the module
- None of the above
|
8: | Which of the following key devices are not present in the small network Corporate Internet module?- Firewall
- VPN concentrator
- NIDS appliance
- Dial-in access server
- Layer 2 switch
|
9: | Where is the NIDS appliance(s) deployed in the medium-sized network Corporate Internet module blueprint?- In the public services segment
- External to the firewall behind the edge router
- Behind the firewall's internal interface
- On the VPN/remote-access segment of the firewall before the VPN concentrator
- In front of the dial-in access server
|
10: | Which of the following are factors in determining whether a WAN module is needed?- When there is an unjustifiable cost factor of migrating to IPSec VPNs
- Whenever management feels that WANs are justified
- When QoS requirements cannot be met through the use of IPSec VPNs
- When private networks are needed for security reasons
- When existing legacy WAN connections exist
|
11: | Which of the following describe how ACLs are applied in the WAN module?- Inbound ACLs restrict the traffic that is permitted into the medium-sized network Campus module from the remote locations.
- Inbound ACLs restrict the traffic that is permitted to reach the remote networks.
- Outbound ACLs determine what traffic is permitted into the medium-sized network Campus module from the remote locations.
- Outbound ACLs determine what traffic from the medium-sized network Campus module is permitted to reach the remote networks.
|