Chapter 1. Introduction Flashcards
1.Which of the following firewalls provides application visibility and control (AVC)?
A. Stateless firewall
B. Stateful firewall
C. Next-generation firewall
D. Management Center
C. Next-generation firewall. An NGFW is designed to provide application visibility and control, as well as to perform deep packet inspection at layers 3–7 to prevent a network from intrusion attempts
2.Which of the following platforms can be used to manage threat defense?
A. Secure Firewall Management Center
B. Secure Firewall Device Manager
C. Cisco Defense Orchestrator
D. All of these answers are correct.
D. All of these answers are correct. You have three options to manage a threat defense, depending on how you want to manage it—remotely using management center, locally via device manager, or from cloud-based Cisco Defense Orchestrator.
3.Which of the following management platforms can manage only one threat defense?
A. Secure Firewall Management Center
B. FireSIGHT Management Center
C. Secure Firewall Device Manager
D. Cisco Defense Orchestrator
C. Secure Firewall Device Manager. Device Manager allows you to manage a single threat defense locally without registering it to any remote management platform.
4.Which release of the Cisco Secure Firewall is chosen for government certification?
A. STR
B. LTR
C. XLTR
D. All of these answers are correct.
C. XLTR. The Extra Long-Term Release (XLTR) offers the longest lifecycle and is chosen for government certification
5.Which of the following software components contains intrusion rules?
A. Operating system
B. SRU/LSP
C. VDB
D. GeoDB
B. SRU/LSP. The rule update package for Snort 2 is known as Cisco Secure Rule Update (SRU). In Snort 3, this rule update package is called the Lightweight Security Package (LSP).
6.Which of the following software components contains the fingerprint of various applications, services, and operating systems?
A. Operating system
B. SRU/LSP
C. VDB
D. GeoDB
C. VDB. VDB is a database that stores vulnerability information and fingerprints of various applications, services, and operating systems (OSs).
7.Which of the following features enables a Secure Firewall to deliver higher throughput?
A. Clustering
B. High availability
C. Hardware bypass
D. All of these answers are correct.
A. Clustering. With clustering, you can simply add extra threat defense devices to your existing deployment and group them into a single logical cluster to support additional throughput.
8.What does a multi-instance deployment enable you to isolate?
A. Firewall policy management
B. Firewall software maintenance
C. Potential failure of a firewall
D. All of these answers are correct.
D. All of these answers are correct. Multi-instance capability enables you to isolate many critical firewall elements, such as firewall policy management, software maintenance tasks, any failure and troubleshooting, and data traffic processing.