Term
|
Definition
Standard, makes decisions based on source IP address |
|
|
Term
|
Definition
Extended, makes decisions based on Source or Dest IP/ port# |
|
|
Term
|
Definition
Makes decisions based on source MAC address |
|
|
Term
ACLs that do not impact packets whose source is the router itself Has implicit deny at the end |
|
Definition
Both standard and extended ACLs |
|
|
Term
ACLs that Should be applied closest to the destination |
|
Definition
|
|
Term
ACLs should be applied closest to the source |
|
Definition
|
|
Term
a good use for Nmap is to... |
|
Definition
identify open ports on a device |
|
|
Term
Command to view the number of packets matching a given ACL entry |
|
Definition
|
|
Term
It can be used on only extended access lists and is meant to block internet traffic except replies to TCP traffic initiated inside |
|
Definition
TCP Keyword "established" |
|
|
Term
Adds temporary ACL Entries (ACE) into an extended ACL that has been applied to external interface based on match of an ACE with a reflect parameter for any type of IP traffic |
|
Definition
|
|
Term
The purpose of using an access list number on the debug ip packet command is to... |
|
Definition
limit the packets displayed and reduce usage of system resources |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Source-quench packet-too-big echo-reply |
|
Definition
|
|
Term
A ______ firewall makes decisions based on info about data flowing thru the firewall, and how it fits with other packets. A ____ firewall forwards or drops a packet using rules for that packet only |
|
Definition
|
|
Term
A firewall is typically placed... |
|
Definition
between the untrusted networks and trusted networks. |
|
|
Term
Unauthorized traffic can be tunneled as legitimate traffic Netowrk performance can slow down Many applications cannot pass through |
|
Definition
|
|
Term
A firewall is always inserted into the network layer as a layer 3 device, T/F? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Application layer protocol session information |
|
|
Term
When an attacker floods a server with the first part of a 3-way handshake but never completes the connections, this is called a(n)_______ attack. |
|
Definition
|
|
Term
How does CBAC handle UDP traffic? |
|
Definition
UDP responses are permitted within a specific time-frame |
|
|
Term
The CBAC item that specified each desired application layer protocol to inspect and generic TCP, UDP, and ICMP if desired, is the_____ |
|
Definition
|
|
Term
If a particular protocol passes thru the firewall rules of acceptable applications and is not listed as a permitted protocol, what will the router do? |
|
Definition
If it passes the inbound ACL on the inbound int, and the outbound ACL on the outbound int, it will be sent on its way with no modifications to the router |
|
|
Term
A CBAC ___ occurs when a msg is displayed concerning CBAC operations. A CBAC ___ keeps track of connections that CBAC inspects |
|
Definition
|
|
Term
An interface in a zone cannot send traffic to any interface that is not a member of a zone, T/F? |
|
Definition
|
|
Term
Interfaces that are members of the same zone cannnot pass traffic between them, T/F? |
|
Definition
|
|
Term
Zone configuration steps in the correct order. |
|
Definition
Define firewall policies Create the zones Define traffic classes Assign policy maps to zone pairs Assign router interfaces to zones |
|
|
Term
Provides stateful inspection and allows return traffic Does not forward traffic Forwards traffic w/o tracking session |
|
Definition
|
|