Cisco IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor Fiche technique Page 166

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 168
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 165
642 -531
Leading the way in IT testing and certification tools, www.testking.com
- 166 -
B. The Conduit is where the data travels on the Bus.
C. It controls what QoS the packets get when going through Eth1.
D. Controls connections between external and internal networks.
Answer: D
Explanation:
the conduit command functions by creating an exception to the PIX Firewall Adaptive
Security Algorithm that then permits connections from one PIX Firewall network interface to
access hosts on another.
Reference: Cisco PIX Firewall Command Reference, Version 6.3
QUESTION NO: 16
Which PIX Command will allow the PIX Firewall to authenticate its certification
authority (CA) by obtaining the CA’s self-signed certificate, which contains the CA’s
public key?
A. ca lock /all
B. show auth
C. Set ca auth
D. ca authenticate
Answer: D
Explanation: The ca authenticate command allows the PIX Firewall to authenticate its
certification authority (CA) by obtaining the CA's self-signed certificate, which contains the
CA's public key.
Reference: Cisco PIX Firewall Command Reference, Version 6.3
QUESTION NO: 17
What port would you be concerned about if you were worried bout DNS Zone Transfers
while protecting your infrastructure with a PIX?
A. UDP 12
B. UDP 53
C. TCP 62
D. UDP 45
Answer: B
Explanation:
Triggers on normal DNS zone transfers, in which the source port is 53.
Reference: Cisco IOS Intrusion Detection System Signature List
QUESTION NO: 18
Vue de la page 165
1 2 ... 161 162 163 164 165 166 167 168

Commentaires sur ces manuels

Pas de commentaire