Chapter 11. Prefilter Policy Flashcards

1
Q

1.Which of the following rules can bypass security inspection?

A. Prefilter rule

B. Tunnel rule

C. Access control rule

D. All of these answers are correct.

A

D. All of these answers are correct. The rule options provided in A, B, and C can bypass security inspection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2.What is the difference between a prefilter rule and an access control rule?

A. A prefilter rule matches for traffic prior to an access control rule.

B. A prefilter rule analyzes traffic based on the outermost header of a packet, whereas an access control rule analyzes the innermost header.

C. A prefilter rule supports limited constraints to create a rule, whereas an access control rule offers many granular options.

D. All of these answers are correct.

A

D. All of these answers are correct. The differences provided in A, B, and C are applicable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3.Which of the following is a best practice for rule creation?

A. To block traffic based on network address or port number, a prefilter rule is a better choice than an access control rule.

B. To bypass inspection, consider a prefilter rule over an access control rule.

C. Bypassing deep packet inspection on management traffic can improve network performance.

D. All of these answers are correct.

A

D. All of these answers are correct. The choices provided in A, B, and C are the best practices for rule creation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4.Which of the following items is not mandatory when deploying a prefilter policy?

A. Invoking a prefilter policy into an access control policy.

B. Enabling logging in a prefilter rule.

C. Choosing a default action for tunnel traffic.

D. All of these items are mandatory.

A

B. Enabling logging in a prefilter rule is not a mandatory step to deploy a prefilter policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

5.Which of the following rules can be used to bypass traffic that is destined to a specific URL?

A. Tunnel rule.

B. Prefilter rule with Fastpath action.

C. Access control rule with Trust action.

D. All of these answers are correct.

A

C. An access control rule with Trust action supports granular filters based on Security Intelligence data, application fingerprints, URL filtering, user identities, and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

6.Which of the following commands displays the rules that are configured in a prefilter policy?

A. show access-list

B. show acl all

C. show prefilter-policy

D. show prefilter-list

A

A. You can use the show access-list command to view the list of prefilter rules as well as access control rules that are active on a threat defense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

7.With which encapsulation protocols can Secure Firewall analyze traffic?

A. GRE

B. IP-in-IP

C. IPv6-in-IP

D. All of these answers are correct.

A

D. All of these answers are correct. Secure Firewall supports various encapsulation protocols, such as Generic Routing Encapsulation (GRE), IP-in-IP, IPv6-in-IP, and Teredo encapsulation protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly