You are configuring the Access Lists for your new Cisco Router. The following are the commands that are entered into the router for the list configuration.
Router(config)#access-list 131 deny tcp 10.10.0.0 0.0.255.255 0.0.0.0 255.255.255.255 eq
Router(config)#access-list 131 permit ip 0.0.0.0 255.255.255.255 0.0.0.0 255.255.255.255
Router(config)#interface Serial 0
Router(config-if)#ip access-group 131 out
Based on this configuration, and using the exhibit, select the answers that identify what the list will accomplish.
Answer : D,E
You are configuring the Access Lists for your new Cisco Router. The following are the commands that are entered into the router for the list configuration.
Router(config)#access-list 171 permit tcp 10.10.0.0 0.0.255.255 any eq 80
Router(config)#access-list 171 deny tcp 0.0.0.0 255.255.255.255 10.10.0.0 0.0.255.255 eq
Router(config)#access-list 171 deny tcp any any eq 23
Router(config)#access-list 171 permit tcp 10.10.0.0 0.0.255.255 any eq 20
Router(config)# access-list 171 permit tcp 10.10.0.0 0.0.255.255 any eq 21
Based on this configuration, and using the exhibit, select the answers that identify how the router will deal with network traffic.
Answer : A,D,E
You are configuring a L2TP solution between your office and your primary branch office.
The CEO has requested a report on the benefits of using this technology. Which of the following benefits does L2TP (with IPSec) provide?
Answer : B,D,E
As you analyze the settings of the Secure Server (Require Security) IPSec policy in
Windows Server -
2003, you are looking at the options available for encryption and integrity. Which of the following answers presents a legitimate combination for encryption and integrity in the
IPSec policy?
Answer : B
You are configuring a new custom IPSec policy on your Windows Server 2003 machine.
On the rules tab, you find the three default options under the IP Filter List. What are these three default options?
Answer : C,D,E
During an analysis of your IPSec implementation, you capture traffic with Network Monitor.
You are verifying that IP is properly identifying AH. When you look into IP, what protocol ID would IP identify with AH?
Answer : D
You are designing a new IPSec implementation for your organization, and are trying to determine your security needs. You need to clearly understand the implementation choices, before you make any changes to the network. Which of the following describes what transport and tunnel modes protect using IPSec?
Answer : A,E
If you wish to implement IPSec between two branch offices of your organization, and wish for this to include the encryption of the full packet, which implementation would meet your needs?
Answer : C
In your current organization, you have been given the task of implementing the IPSec solution. All your servers are running Windows Server 2003, so you wish to use the built in policies. What are the three default IPSec policies in Windows Server 2003?
Answer : A,B,C
You have clients that are connected to your network via a VPN. What is the internetwork environment that connects the VPN Client to the VPN Server called?
Answer : D
To verify that your PPTP implementation is working as you intended, you sniff the network after the implementation has been completed. You are looking for specific values in the captures that will indicate to you the type of packets received. You analyze the packets, including headers and payload. PPTP works at which layer of the OSI model?
Answer : B
You are the firewall administrator for your company and you have just learned that the
Server administrators are gearing up support an L2TP based VPN solution. You are told to be sure that your firewall rule sets will not hinder the performance of the VPN. Which port, from the following list, will you have to allow through the firewall?
Answer : B
After you implemented your IPSec solution, you wish to run some tests to verify functionality. Which of the following provides confidentiality and authentication when implementing IPSec?
Answer : B
Your network is going to implement a new IPSec solution. Which of the following IPSec components is used to define the security environment in which the two hosts communicate?
Answer : E
You are the firewall administrator at your company and the network administrators have decided to implement a PPTP VPN solution, which of these ports would you need to allow through the firewall to allow these VPN sessions into your network?
Answer : A