Ccna certification Practice Tests



Download 8,04 Mb.
Pdf ko'rish
bet388/559
Sana28.08.2021
Hajmi8,04 Mb.
#157675
1   ...   384   385   386   387   388   389   390   391   ...   559
Bog'liq
dumpccna 200-301 mavzulashtirilgan test

259

 13.  B.  Since the MAC address table is empty on Switch A, Switch A will flood the frame to 

all ports on the switch. This will include the router attached to interface Fa0/3. However, 

a router does not perform forward/filter decisions, so the frame will not be flooded any 

further on Router A. Switch A will forward the frame to all ports, but the router will not 

forward the frame onto the segment where Switch B is located. Switch B will never see the 

frame from Switch A because Router A segments the two networks.



 14.  C.  The demilitarized zone (DMZ) is where Internet-facing servers/services are placed. The 

outside zone is where the public Internet connection is connected and it is the least trusted. 

The enterprise network zone is considered the inside zone. The inside zone is considered to 

be the highest trusted network because it is the internal network that you control.



 15.  B.  Firewalls should always be placed at key security boundaries, which can be the Internet 

and your internal network. However, proper placement is not exclusive to the boundaries 

of the Internet and internal networks. For example, it could be placed between two 

internal networks, such as R&D and guest networks. The demilitarized zone (DMZ) is a 

segment of a firewall where Internet-facing services are placed. Firewalls are normally not 

placed only between the DMZ and the Internet because most networks have an internal 

network.

 16.  B.  Firewalls are not commonly deployed to provide protection from internal attacks on 

internal resources. They are designed to protect networks from external attacks or attacks 

emanating from the outside or directed toward the Internet. Firewalls normally provide 

stateful packet inspection. Firewalls can also control application traffic by port number 

and higher-layer attributes.

 17.  A.  All physical access to a firewall should be controlled tightly so that it is not tampered 

with, which could allow external threats to enter the network. This control should include 

vendors and approved administrators. Physical access to the firewall is a security principle 

and therefore not a consideration for the management of a firewall. All firewall policies 

should be documented as a part of the firewall management process. Firewall logs should 

be regularly monitored for suspicious activity as part of the firewall management process. 

Firewalls can allow or deny traffic by default; this is a consideration when managing 

a firewall.



 18.  C.  Firewalls keep track of the TCP conversation before and after the three-way 

handshake. This is done so that an attack on the TCP/UDP flow is not executed; in 

addition, DoS attacks can be thwarted, such as a SYN flood. Zone state is terminology 

that is used with firewalls; therefore, it is an incorrect answer. Firewalls do not protect 

by keeping statistics or accounting information for the state of packets. Firewalls do not 

transition between defense states.



 19.  A.  ASAs allow for zones to be created and the connections applied to the zones. This 

methodology allows for security rules to be applied uniformly to the outside zone. There 

is no such thing as an ISP zone. You can apply an ACL to the zone but not directly to the 

interface. Each connection can be managed by a group once it is added to the same zone.





Download 8,04 Mb.

Do'stlaringiz bilan baham:
1   ...   384   385   386   387   388   389   390   391   ...   559




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish