Chapter 11. Prefilter Policy Flashcards
1.Which of the following rules can bypass security inspection?
A. Prefilter rule
B. Tunnel rule
C. Access control rule
D. All of these answers are correct.
D. All of these answers are correct. The rule options provided in A, B, and C can bypass security inspection.
2.What is the difference between a prefilter rule and an access control rule?
A. A prefilter rule matches for traffic prior to an access control rule.
B. A prefilter rule analyzes traffic based on the outermost header of a packet, whereas an access control rule analyzes the innermost header.
C. A prefilter rule supports limited constraints to create a rule, whereas an access control rule offers many granular options.
D. All of these answers are correct.
D. All of these answers are correct. The differences provided in A, B, and C are applicable.
3.Which of the following is a best practice for rule creation?
A. To block traffic based on network address or port number, a prefilter rule is a better choice than an access control rule.
B. To bypass inspection, consider a prefilter rule over an access control rule.
C. Bypassing deep packet inspection on management traffic can improve network performance.
D. All of these answers are correct.
D. All of these answers are correct. The choices provided in A, B, and C are the best practices for rule creation.
4.Which of the following items is not mandatory when deploying a prefilter policy?
A. Invoking a prefilter policy into an access control policy.
B. Enabling logging in a prefilter rule.
C. Choosing a default action for tunnel traffic.
D. All of these items are mandatory.
B. Enabling logging in a prefilter rule is not a mandatory step to deploy a prefilter policy.
5.Which of the following rules can be used to bypass traffic that is destined to a specific URL?
A. Tunnel rule.
B. Prefilter rule with Fastpath action.
C. Access control rule with Trust action.
D. All of these answers are correct.
C. An access control rule with Trust action supports granular filters based on Security Intelligence data, application fingerprints, URL filtering, user identities, and so on.
6.Which of the following commands displays the rules that are configured in a prefilter policy?
A. show access-list
B. show acl all
C. show prefilter-policy
D. show prefilter-list
A. You can use the show access-list command to view the list of prefilter rules as well as access control rules that are active on a threat defense.
7.With which encapsulation protocols can Secure Firewall analyze traffic?
A. GRE
B. IP-in-IP
C. IPv6-in-IP
D. All of these answers are correct.
D. All of these answers are correct. Secure Firewall supports various encapsulation protocols, such as Generic Routing Encapsulation (GRE), IP-in-IP, IPv6-in-IP, and Teredo encapsulation protocols.