quiz 5 Flashcards
Select True or False. A Layer 3 interface can be configured as dual stack with both IPv4 and IPv6 addresses.
Select one:
a. False
b. True
True
Select True or False. All of the interfaces on a Next Generation firewall must be the same interface type.
Select one:
a. False
b. True
True
Select True or False. In a Next Generation firewall, every interface in use must be assigned to a zone in order to process traffic.
Select one:
a. True
b. False
True
Select True or False. In addition to routing to other network devices, virtual routers on the Next Generation firewall can route to other virtual routers.
Select one:
a. True
b. False
True
What type of interface allows the Next Generation firewall to provide switching between two or more networks?
Select one:
a. Layer2
b. Tap
c. Virtual Wire
d. Layer3
Layer2
Which feature can be configured with an IPv6 address?
Select one:
a. RIPv2
b. BGP
c. Static Route
d. DHCP Server
Static Route
Which of the following is a routing protocol supported in a Next Generation firewall?
Select one:
a. RIPV2
b. IGRP
c. EIGRP
d. ISIS
RIPV2
Which routing protocol is supported on a virtual router?
Select one:
a. IGRP
b. OSPF
c. EGP
d. PPP
OSPF
Which type of firewall interface enables passive monitoring of network traffic?
Select one:
a. Tunnel
b. Tap
c. Virtual wire
d. Loopback
Tap
Select one:
a. Tap
b. Layer 2
c. Layer 3
d. Virtual Wire
Virtual Wire
A critical consideration when defining Network Segmentation is ____________.
Select one:
a. eliminating security zones
b. third party management
c. understanding your business and organizational drivers
d. password management
understanding your business and organizational drivers
From the reading “Four Ps of 5G Network Security”: Which of the following is NOT one of the ‘Four Ps’?
Select one:
a. Protection
b. Permissions
c. Perimeter
d. Packets
Protection
From the reading “Securing OT to enable Manufacturing Digital Transformation”: The risk of operations managing security at the local level is the potential of having _______________ approaches to security.
Select one:
a. centralized
b. IT administered
c. multiple,disjointed
d. third party management
multiple,disjointed