Checkpoint Exam: Firewalls, Cryptography, and Cloud Security Flashcards

1
Q

Refer to the exhibit. An administrator has configured a standard ACL on R1 and applied it to interface serial 0/0/0 in the outbound direction. What happens to traffic leaving interface serial 0/0/0 that does not match the configured ACL statements?

Router(config)# ip access-list extended SECURE
Router(config-ext-nacl)# permit tcp any 192.168.254.0 0.01.255 established
Router(config0ext0nacl)# end
Router#

The resulting action is determined by the destination IP address and port number.

The resulting action is determined by the destination IP address.

The traffic is dropped.

The source IP address is checked and, if a match is not found, traffic is routed out interface serial 0/0/1.

A

The traffic is dropped.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When an inbound Internet-traffic ACL is being implemented, what should be included to prevent the spoofing of internal networks?

ACEs to prevent broadcast address traffic

ACEs to prevent traffic from private address spaces

ACEs to prevent ICMP traffic

ACEs to prevent SNMP traffic

ACEs to prevent HTTP traffic

A

ACEs to prevent traffic from private address spaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Refer to the exhibit, What is the result of adding the establihed argument to the end of the ACE?

Router(config)# ip access-list extended SECURE
Router(config-ext-nacl)# permit tcp any 192.168.254.0 0.0.1.255 established
Router(config-ext-nacl)#exit
Router#

192.168.254.0 /23 traffic is allowed to reach any network.

Any IP traffic is allowed to reach the 192.168.254.0 255.255.254.0 network as long as it is in response to an originated request.

Any traffic is allowed to reach the 192.168.254.0 255.255.254.0 network.

Any TCP traffic is allowed to reach the 192.168.254.0 255.255.254.0 network if it is in response to an originated request.

A

Any TCP traffic is allowed to reach the 192.168.254.0 255.255.254.0 network if it is in response to an originated request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What single access list statement maches all of the following networks?

192.168.16.0
192.168.17.0
192.168.18.0
192.168.19.0

access-list 10 permit 192.168.16.0 0.0.0.255

access-list 10 permit 192.168.16.0 0.0.3.255

access-list 10 permit 192.168.16.0 0.0.15.255

access-list 10 permit 192.168.0.0 0.0.15.255

A

access-list 10 permit 192.168.16.0 0.0.3.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Refer to the exhibit. The IPv6 access list LIMITED_ACCESS is applied on the S0/0/0 interface of R1 in the inbound direction. Which IPv6 packets from the ISP will be dropped by the ACL on R1?

R1#show access-lists
IPv6 access list LIMITED_ACCESS
permit tcp any host 2001:DB8:11:10::10 eq www sequence 10
permit tcp any host 2001:DB8:11:10::10 eq 443 sequence 20
deny ipv6 any 2001:DB8:11:10::/64 sequence 30

neighbor advertisements that are received from the ISP router

HTTPS packets to PC1

ICMPv6 packets that are destined to PC1

packets that are destined to PC1 on port 80

A

ICMPv6 packets that are destined to PC1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are two characteristics of a stateful firewall? (Choose two.)

uses static packet filtering techniques

uses connection information maintained in a state table

prevents Layer 7 attacks

analyzes traffic at Layers 3, 4 and 5 of the OSI model

uses complex ACLs which can be difficult to configure

A

uses connection information maintained in a state table

analyzes traffic at Layers 3, 4 and 5 of the OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does a firewall handle traffic when it is originating from the public network and traveling to the DMZ network?

Traffic that is originating from the public network is inspected and selectively permitted when traveling to the DMZ network.

Traffic that is originating from the public network is usually forwarded without inspection when traveling to the DMZ network.

Traffic that is originating from the public network is usually blocked when traveling to the DMZ network.

Traffic that is originating from the public network is usually permitted with little or no restriction when traveling to the DMZ network.

A

Traffic that is originating from the public network is inspected and selectively permitted when traveling to the DMZ network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of firewall is commonly part of a router firewall and allows or blocks traffic based on Layer 3 and Layer 4 information?

stateless firewall

proxy firewall

stateful firewall

application gateway firewall

A

Stateless Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is one limitation of a stateful firewall?

not as effective with UDP- or ICMP-based traffic

poor log information

cannot filter unnecessary traffic

weak user authentication

A

not as effective with UDP- or ICMP-based traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does a firewall handle traffic when it is originating from the private network and traveling to the DMZ network?

The traffic is selectively denied based on service requirements.

The traffic is selectively permitted and inspected.

The traffic is usually blocked.

The traffic is usually permitted with little or no restrictions.

A

The traffic is usually permitted with little or no restrictions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When a Cisco IOS zone-based policy firewall is being configured, which three actions can be applied to a traffic class? (Choose three.)

reroute

queue

drop

pass

shape

inspect

A

drop

pass

inspect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which two statements describe the two configuration models for Cisco IOS firewalls? (Choose two.)

Both IOS Classic Firewall and ZPF models require ACLs to define traffic filtering policies.

ZPF must be enabled in the router configuration before enabling an IOS Classic Firewall.

The IOS Classic Firewall and ZPF cannot be combined on a single interface.

IOS Classic Firewalls and ZPF models can be enabled on a router concurrently.

IOS Classic Firewalls must be enabled in the router configuration before enabling ZPF.

A

The IOS Classic Firewall and ZPF cannot be combined on a single interface.

IOS Classic Firewalls and ZPF models can be enabled on a router concurrently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are two benefits of using a ZPF rather than a Classic Firewall? (Choose two.)

With ZPF, the router will allow packets unless they are explicitly blocked.

ZPF policies are easy to read and troubleshoot.

Multiple inspection actions are used with ZPF.

The ZPF is not dependent on ACLs.

ZPF allows interfaces to be placed into zones for IP inspection.

A

ZPF policies are easy to read and troubleshoot.

The ZPF is not dependent on ACLs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When using Cisco IOS zone-based policy firewall, where is the inspection policy applied?

to a zone pair

to a global service
policy

to a zone

to an interface

A

to a zone pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which zone-based policy firewall zone is system-defined and applies to traffic destined for the router or originating from the router?

inside zone

outside zone

system zone

local zone

self zone

A

self zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which cloud security domain covers cloud-specific aspects of infrastructure security and foundations for operating securely in the cloud?

Application Security

Data Security and Encryption

Management Plane and Business Continuity

Infrastructure Security

A

Infrastructure Security

17
Q

Which technique can be used to leverage virtual network topologies to run smaller and more isolated networks without incurring additional hardware costs?

shadow IT

microsegmentation

fog computing

edge computing

A

microsegmentation

18
Q

Which algorithm is used with symmetric encryption to provide confidentiality?

RSA

MD5

AES

ECC

19
Q

In which phase of application development is new software verified to run under the required security settings?

testing

staging

developing

provisioning

20
Q

What is the description of VM sprawl?

The demand for VMs is greater than the ability to create VMs.

When a process breaks out of the VM and interacts with the host operating system.

VMs are spread over too large of a geographic area.

There are more VMs than can be effectively managed.

A

There are more VMs that can be effectively managed.

21
Q

Which measure can a security analyst take to perform effective security monitoring against network traffic encrypted by SSL technology?

Use a Syslog server to capture network traffic.

Require remote access connections through IPsec VPN.

Deploy a Cisco ASA.

Deploy a Cisco SSL Appliance.

A

Deploy a Cisco SSL Appliance

22
Q

What technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative identity?

hashing algorithms

PKI certificates

symmetric keys

digital signatures

A

PKI certificates

23
Q

Match the description with the correct term

creating a message that says one thing but means something else to a specific audience

discovering that hidden information exists within a graphic file

making a message confuising so it is harder to understand

hiding data within a audio file

steganalysis

social stegranography

steganopgraphy

obfuscation

A

creating a message that says one thing but means something else to a specific audience
(Social Steganography)

discovering that hidden information exists within a graphic file
(Obfuscation)

making a message confuising so it is harder to understand
(Steganography)

hiding data within a audio file
(Steganlysis)

24
Q

Which method tries all possible passwords until a match is found?

cloud

cryptographic

birthday

brute force

rainbow tables

dictionary

A

brute force

25
Q

An IT enterprise is recommending the use of PKI applications to securely exchange information between the employees. In which two cases might an organization use PKI applications to securely exchange information between users? (Choose two.)

file and directory
access permission

HTTPS web service

local NTP server

802.1x authentication

FTP transfers

A

HTTPS web service

802.1x authentication