Lesson 3 Flashcards

1
Q

A Cisco firewall maintains a translation or _______ for each protected host that can participate in connections

A

xlate table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Each entry in the xlate table contains the following

A
–Protocol used (ICMP, UDP, or TCP)
–Local and global interfaces, IP addresses, and port numbers
– Flags (type of xlate)
–Connections
–Timers
– Uauth bindings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Initial checking provides protection against address spoofing by using unicast __________

A

Reverse Path Forwarding ( RPF )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RPF essentially verifies that an incoming packet would take the same path in reverse to reach the source.

RPF can detect ___________ only if spoofed between interfaces.

If a host on the outside interface spoofs the address of another outside host, the firewall can’t detect it, because the spoofing occurs on a single interface.

A

spoofed addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When the first packet in a series of packets arrives at the security appliance from the inside interface, the appliance creates a _____________ . Each translation uses one _________

A

translation slot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

For example, a client could connect to a server via telnet, FTP, and HTTP simultaneously, creating three separate TCP connections between the two devices.

When this happens, a single _________ slot and three _____ slots are created. Each ____
slot is bound to a _____ slot.

A

translation - connection

connection - translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

As soon as a connection initiates and a ___________ entry is created, traffic from the source to the destination is allowed to pass.

Also, the _____ or ____ traffic for that connection is allowed back through the firewall toward the source automatically for TCP and UDP connections.

A

conn table

return or reply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An access list is _________ to allow returning traffic, because the ASA allows ____________________________

A

not required

all returning traffic for established, bidirectional connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

For connectionless protocols such as ICMP, however, the security appliance establishes __________ sessions.

A

unidirectional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

For authentication users, the firewall acts as a _____________________ so that no further authentication is needed.

A

cut - through authentication proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The firewall inspects each connection and applies rules according to the protocol being used. This process is referred to as an __________________ .

A

inspection engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If NAT is used, the ICMP connection is open for ________. after the ICMP reply.

A

2 sec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

UDP Inspection If no packets have passed through the connection before the UDP idle connection timer expires, the UDP connection is closed by being deleted from the conn table after _______

A

2 minutes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

For TCP:
– A FIN and FIN/ ACK are in the TCP header control field.
– An RST is in the TCP header control field (from client or server). – The TCP connection is idle for more than __________ by default.
– The connection is removed with the clear ___ command.

A

1 hour

xlate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____________ Translates host addresses on more secure interfaces to a range or pool of IP addresses on a less secure interface.

A

Dynamic translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

__________________ Provides a permanent, one - to - one mapping between an IP address on a more secure interface and an IP address on a less secure interface. With the appropriate ACLS , a static translation can allow users on a less secure interface to access a host on a more secure interface without exposing the actual IP address of the host on the more secure interface.

A

Static translation

17
Q

The logical name of the interface where the local devices are located appears in _________

A

parentheses “ ( ) ”, eg , (inside)

18
Q

The _______ command is used to associate a specific pool of addresses to be used with a NAT process ID.

A

global

19
Q

If you want to use PAT, you can use the global IP address or use the ____________ instead of the global IP address.

A

interface keyword

20
Q

Special name for NAT id _ Means do not use NAT.

A

0