Академический Документы
Профессиональный Документы
Культура Документы
1. When logging is enabled for an ACL entry, how does the router
switch packets filtered by the ACL?
(A)topology-based switching
(B)autonomous switching
(C)process switching
(D) optimum switching
3. Refer to the exhibit. The ACL statement is the only one explicitly
configured on the router. Based on this information, which two
conclusions can be drawn regarding remote access network
connections? (Choose two.)
9. Which two parameters are tracked by CBAC for TCP traffic but not
for UDP traffic? (Choose two.)
(A)source port
(B)protocol ID
(C)sequence number
(D) destination port
(E)SYN and ACK flags
14. Which three actions can a Cisco IOS zone-based policy firewall
take if configured with Cisco SDM? (Choose three.)
(A)inspect
(B)evaluate
(C)drop
(D) analyze
(E)pass
(F) forward
15. Refer to the exhibit. Based on the SDM screen shown, which
statement describes the zone-based firewall component being
configured?
(A)a class map that inspects all traffic that uses the HTTP, IM,
P2P, and email protocols
(B)a class map that prioritizes traffic that uses HTTP first,
followed by SMTP, and then DNS
(C)a class map that denies all traffic that uses the HTTP, SMTP,
and DNS protocols
(D) a class map that inspects all traffic that uses the HTTP,
SMTP, and DNS protocols
(E)a class map that inspects all traffic, except traffic that uses
the HTTP, SMTP, and DNS protocols
16. Refer to the exhibit. Based on the SDM screen shown, which two
statements describe the effect this zone-based policy firewall has
on traffic? (Choose two.)
19. When using Cisco IOS zone-based policy firewall, where is the
inspection policy applied?
(A)a global service policy
(B)an interface
(C)a zone
(D) a zone pair
(A)inside interface
(B)outside interface
(C)inside and outside interfaces
(D) no interfaces