Network Security Fundamentals [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network Security Fundamentals [Electronic resources] - نسخه متنی

Gert De Laet, Gert Schauwers

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

Chapter 8 Q&A

1:

Give two commands to configure an enable password on a router.

A1:

Answer: Two commands to configure an enable password on a router are

enable password and

enable secret .

2:

Name three services that are running on a router that should be turned off if they are not used.

A2:

Answer: Services that are running on a router that should be turned off if they are not used include BOOTP server, DNS resolution, HTTP server, and IP redirect.

3:

Name the different types of access lists that can be used.

A3:

Answer: The different types of access lists that can be used include the following:

  • Standard numbered access list

  • Standard named access list

  • Extended numbered access list

  • Extended named access list

4:

What are dynamic access lists?

A4:

Answer: Dynamic access lists, also known as lock-and-key, create specific, temporary openings in response to user authentication.

5:

What is CBAC used for when it is configured on a router?

A5:

Answer: CBAC used for traffic filtering, traffic inspection, and alerts and audit trials when it is configured on a router.

6:

List five tasks to configure CBAC.

A6:

Answer: Tasks to configure CBAC include the following:

  • Pick an interface: internal or external.

  • Configure an IP access list on that interface.

  • Configure global timeouts and thresholds.

  • Define an inspection rule.

  • Apply the inspection rule to an interface.

  • Configure logging and audit trail.

7:

What does the

ip inspect max-incomplete high command do?

A7:

Answer: The number of existing half-open sessions can be set, causing the software to start deleting half-open sessions (default is 500 existing half-open sessions).

8:

Give three different types of enhanced access lists.

A8:

Answer: Three different types of enhanced access lists are as follows:

  • Dynamic access lists

  • Time-based access lists

  • Reflexive access lists

9:

What can be filtered with reflexive access lists?

A9:

Answer: With reflexive access lists, you have the ability to filter network traffic at a router, based on IP upper-layer protocol session information.

10:

How can reflexive access lists be defined?

A10:

Answer: Reflexive access lists can be defined by extended named IP access lists only. You cannot define reflexive access lists with numbered or standard named access lists. Reflexive access lists have significant differences from other types of access lists. They contain only temporary entries. These entries are automatically created when a new IP session begins and are removed when the session ends. Reflexive access list are not applied directly to the interface, but are "nested" within an extended named IP access list that is applied to that interface.


/ 196