CCNA Security Chapter 9 Exam Answers
1.
Refer to the exhibit. An administrator
creates three zones (A, B, and C) in an ASA that filters traffic. Traffic
originating from Zone A going to Zone C is denied, and traffic originating from
Zone B going to Zone C is denied. What is a possible scenario for Zones A, B,
and C?
·
A – DMZ, B – Inside, C – Outside
·
A – Inside, B – DMZ, C – Outside
·
A – Outside, B – Inside, C – DMZ
·
A – DMZ, B – Outside, C
– Inside
2.
What is one of the drawbacks to using
transparent mode operation on an ASA device?
·
no support for IP addressing
·
no support for management
·
no support for using an ASA as a Layer 2
switch
·
no support for QoS
3.
What is a characteristic of ASA security
levels?
·
An ACL needs to be
configured to explicitly permit traffic from an interface with a lower security
level to an interface with a higher security level.
·
Each operational interface must have a
name and be assigned a security level from 0 to 200.
·
The lower the security level on an
interface, the more trusted the interface.
·
Inbound traffic is identified as the
traffic moving from an interface with a higher security level to an interface
with a lower security level.
4.
Refer to the exhibit. Two types of VLAN
interfaces were configured on an ASA 5505 with a Base license. The
administrator wants to configure a third VLAN interface with limited
functionality. Which action should be taken by the administrator to configure
the third interface?
·
Because the ASA 5505 does not support
the configuration of a third interface, the administrator cannot configure the
third VLAN.
·
The administrator must
enter the no forward interface vlan command before the nameif command on the third
interface.
·
The administrator configures the third
VLAN interface the same way the other two were configured, because the Base
license supports the proposed action.
·
The administrator needs to acquire the
Security Plus license, because the Base license does not support the proposed
action.
5.
What command defines a DHCP pool that uses
the maximum number of DHCP client addresses available on an ASA 5505 that is
using the Base license?
·
CCNAS-ASA(config)# dhcpd address
192.168.1.20-192.168.1.50 inside
·
CCNAS-ASA(config)# dhcpd address
192.168.1.10-192.168.1.100 inside
·
CCNAS-ASA(config)# dhcpd
address 192.168.1.25-192.168.1.56 inside
·
CCNAS-ASA(config)# dhcpd address
192.168.1.30-192.168.1.79 inside
6.
Which two statements are true about ASA
standard ACLs? (Choose two.)
·
They are the most common type of ACL.
·
They are applied to interfaces to
control traffic.
·
They are typically only
used for OSPF routes.
·
They specify both the source and
destination MAC address.
·
They identify only the
destination IP address.
7.
Refer to the exhibit. A network
administrator is configuring the security level for the ASA. What is a best
practice for assigning the security level on the three interfaces?
·
Outside 40, Inside 100, DMZ 0
·
Outside 0, Inside 35, DMZ 90
·
Outside 100, Inside 10, DMZ 40
·
Outside 0, Inside 100,
DMZ 50
8.
Refer to the exhibit. A network
administrator is configuring the security level for the ASA. Which statement
describes the default result if the administrator tries to assign the Inside
interface with the same security level as the DMZ interface?
·
The ASA allows inbound traffic initiated
on the Internet to the DMZ, but not to the Inside interface.
·
The ASA console will display an error
message.
·
The ASA will not allow
traffic in either direction between the Inside interface and the DMZ.
·
The ASA allows traffic from the Inside
to the DMZ, but blocks traffic initiated on the DMZ to the Inside interface.
9.
What is a difference between ASA IPv4 ACLs
and IOS IPv4 ACLs?
·
ASA ACLs are always named, whereas IOS
ACLs are always numbered.
·
Multiple ASA ACLs can be applied on an
interface in the ingress direction, whereas only one IOS ACL can be applied.
·
ASA ACLs use the subnet
mask in defining a network, whereas IOS ACLs use the wildcard mask.
·
ASA ACLs do not have an implicit deny
any at the end, whereas IOS ACLs do.
·
ASA ACLs use forward and drop ACEs,
whereas IOS ACLs use permit and deny ACEs.
10.
What is the purpose of the webtype ACLs in
an ASA?
·
to inspect outbound traffic headed
towards certain web sites
·
to restrict traffic that is destined to
an ASDM
·
to monitor return traffic that is in
response to web server requests that are initiated from the inside interface
·
to filter traffic for
clientless SSL VPN users
11.
Refer to the exhibit. A network
administrator has configured NAT on an ASA device. What type of NAT is used?
·
inside NAT
·
static NAT
·
bidirectional NAT
·
outside NAT
12.
Refer to the exhibit. A network
administrator is configuring an object group on an ASA device. Which
configuration keyword should be used after the object group name SERVICE1?
·
icmp
·
ip
·
udp
·
tcp
13.
When dynamic NAT on an ASA is being
configured, what two parameters must be specified by network objects? (Choose
two.)
·
a range of private
addresses that will be translated
·
the interface security level
·
the pool of public
global addresses
·
the inside NAT interface
·
the outside NAT interface
14.
What function is performed by the class maps
configuration object in the Cisco modular policy framework?
·
identifying interesting
traffic
·
applying a policy to an interface
·
applying a policy to interesting traffic
·
restricting traffic through an interface
15.
Refer to the exhibit. Based on the
security levels of the interfaces on ASA1, what traffic will be allowed on the
interfaces?
·
Traffic from the Internet and DMZ can
access the LAN.
·
Traffic from the Internet and LAN can
access the DMZ.
·
Traffic from the Internet can access
both the DMZ and the LAN.
·
Traffic from the LAN and
DMZ can access the Internet.
16.
What are three characteristics of the ASA
routed mode? (Choose three.)
·
This mode is referred to as a “bump in
the wire.”
·
In this mode, the ASA is invisible to an
attacker.
·
The interfaces of the
ASA separate Layer 3 networks and require different IP addresses in different subnets.
·
It is the traditional
firewall deployment mode.
·
This mode does not support VPNs, QoS, or
DHCP Relay.
·
NAT can be implemented
between connected networks.
17.
Refer to the exhibit. An administrator has
configured an ASA 5505 as indicated but is still unable to ping the inside
interface from an inside host. What is the cause of this problem?
·
The no shutdown command
should be entered on interface Ethernet 0/1.
·
VLAN 1 should be the outside interface
and VLAN 2 should be the inside interface.
·
VLAN 1 should be assigned to interface
Ethernet 0/0 and VLAN 2 to Ethernet 0/1.
·
The security level of the inside
interface should be 0 and the outside interface should be 100.
·
An IP address should be configured on
the Ethernet 0/0 and 0/1 interfaces.
18.
Refer to the exhibit. According to the
command output, which three statements are true about the DHCP options entered
on the ASA 5505? (Choose three.)
·
The dhcpd address
[start-of-pool]-[end-of-pool] inside command was issued to enable the DHCP
client.
·
The dhcpd auto-config outside command
was issued to enable the DHCP server.
·
The dhcpd address
[start-of-pool]-[end-of-pool] inside command was issued to enable the DHCP
server.
·
The dhcpd auto-config outside
command was issued to enable the DHCP client.
·
The dhcpd enable inside command was
issued to enable the DHCP client.
·
The dhcpd enable inside
command was issued to enable the DHCP server.
19.
Refer to the exhibit. What will be
displayed in the output of the show running-config objectcommand after the
exhibited configuration commands are entered on an ASA 5505?
·
host 192.168.1.4
·
host 192.168.1.3, host 192.168.1.4, and
range 192.168.1.10 192.168.1.20
·
host 192.168.1.4 and range 192.168.1.10
192.168.1.20
·
host 192.168.1.3 and host 192.168.1.4
·
range 192.168.1.10
192.168.1.20
·
host 192.168.1.3
20.
What must be configured on a Cisco ASA
device to support local authentication?
·
AAA
·
the IP address of the RADIUS or TACACS+
server
·
encrypted passwords
·
SSHv2
·
RSA keys
21.
Which statement describes a difference
between the Cisco ASA IOS CLI feature and the router IOS CLI feature?
·
ASA uses the ? command whereas a router
uses the help command to receive help on a brief description and the syntax of
a command.
·
To use a show command in
a general configuration mode, ASA can use the command directly whereas a router
will need to enter the do command before issuing the show command.
·
To complete a partially typed command,
ASA uses the Ctrl+Tab key combination whereas a router uses the Tab key.
·
To indicate the CLI EXEC mode, ASA uses
the % symbol whereas a router uses the # symbol.
22.
What are two factory default
configurations on an ASA 5505? (Choose two.)
·
VLAN 2 is configured with the name
inside.
·
The internal web server is disabled.
·
DHCP service is enabled for internal
hosts to obtain an IP address and a default gateway from the upstream device.
·
PAT is configured to
allow internal hosts to access remote networks through an Ethernet interface.
·
VLAN 1 is assigned a
security level of 100.
23.
Which type of NAT would be used on an ASA
where 10.0.1.0/24 inside addresses are to be translated only if traffic from
these addresses is destined for the 198.133.219.0/24 network?
·
policy NAT
·
dynamic NAT
·
static NAT
·
dynamic PAT
24.
Which statement describes a feature of AAA
in an ASA device?
·
Accounting can be used
alone.
·
Authorization is enabled by default.
·
If authorization is disabled, all
authenticated users will have a very limited access to the commands.
·
Both authorization and accounting
require a user to be authenticated first.
25.
A network administrator is working on the
implementation of the Cisco Modular Policy Framework on an ASA device. The
administrator issues a clear service-policy command. What is the effect after
this command is entered?
·
All class map configurations are
removed.
·
All service policy
statistics data are removed.
·
All service policies are removed.
·
All policy map configurations are
removed.
26.
What is needed to allow specific traffic
that is sourced on the outside network of an ASA firewall to reach an internal
network?
·
ACL
·
NAT
·
dynamic routing protocols
·
outside security zone level 0
0 التعليقات :
إرسال تعليق