The purpose of the "Do I Know This Already?" quiz is to help you decide if you really need to read the entire chapter. If you already intend to read the entire chapter, you do not necessarily need to answer these questions now.
The ten-question quiz, derived from the major sections in the "Foundation Topics" portion of the chapter, helps you determine how to spend your limited study time.
What does the Flood Defender feature on the PIX Firewall do?
It prevents the PIX Firewall from being flooded with water.
It protects the inside network from being engulfed by rain.
It protects against SYN flood attacks.
It protects against AAA attacks.
Which PIX feature mitigates a DoS attack that uses an incomplete IP datagram?
Floodguard
Incomplete Guard
Fragguard
Mail Guard
Which of the following multimedia application(s) is(are) supported by PIX Firewall?
CuSeeMe
NetMeeting
Internet Video Phone
All of the above
Which is the default port that PIX inspects for H.323 traffic?
1628
1722
1720
1408
Which of the following describes how the Mail Guard works on the PIX Firewall?
It lets all mail in except for mail described by an access list.
It restricts SMTP requests to seven commands.
It revokes mail messages that contain attacks.
It performs virus checks on each mail message.
Which of the following statements about DNS Guard is true?
It is disabled by default.
It allows only a single DNS response for outgoing requests.
It monitors the DNS servers for suspicious activities.
It is enabled by default.
Which of the following are PIX Firewall attack mitigation features?
DNS Guard
Floodgate Guard
Mail Guard
Webguard
Which command enables the PIX Firewall IDS feature?
ids enable
ip audit
ip ids audit
audit ip ids
What is the default action of the PIX IDS feature?
Nothing
Drop
Alarm
Reset
What does the reset action do in the PIX Firewall IDS configuration?
Warns the source of the offending packet before it drops the packet
Drops the offending packet and closes the connection if it is part of an active connection with a TCP RST
Waits 2000 offending packets, and then permanently bans the connection to the source host
Reports the incident to the syslog server and waits for more offending packets from the same source to arrive
The answers to the "Do I Know This Already?" quiz are found in Appendix A, "Answers to the ''''Do I Know This Already?'''' Quizzes and Q&A Sections." The suggested choices for your next step are as follows:
Foundation Topics," "Foundation Summary," and "Q&A" sections.
Foundation Summary" section and then go to the "Q&A" section. Otherwise, move to the next chapter.