For Part 1 of this series, click here.
The following questions will be added to the Core Knowledge Simulation once the new version/engine is complete. Enjoy! Answers will be provided in the comments section.
Implement secure networks using Cisco ASA Firewalls
The PC at 20.20.20.101 can ping both R1 and the ASA. Based on the network diagram, what would allow the PC to reach the 10.10.10.0 network?
Implement secure networks using Cisco IOS Firewalls
Based on the exhibit, what technology is being used, and what traffic is being allowed?
During a cryptographic process, a clear text message is used with a key and processed by a mathematical function. What is this mathematical function often called?
During asymmetric encryption, which key is exchanged with another party?
The following questions will be added to the Core Knowledge Simulation once the new version/engine is complete. Enjoy! Answers will be provided in the comments section.
Implement secure networks using Cisco ASA Firewalls
The PC at 20.20.20.101 can ping both R1 and the ASA. Based on the network diagram, what would allow the PC to reach the 10.10.10.0 network?
Implement secure networks using Cisco IOS Firewalls
Based on the exhibit, what technology is being used, and what traffic is being allowed?
show policy-map type inspect zone-pairImplement secure networks using Cisco VPN solutions
Zone-pair: inside-to-outside
Service-policy inspect : pmap_outbound
Class-map: cmap_outbound (match-any)
Match: protocol ssh
0 packets, 0 bytes
30 second rate 0 bps
Match: protocol http
0 packets, 0 bytes
30 second rate 0 bps
Match: protocol icmp
2 packets, 88 bytes
30 second rate 0 bps
Inspect
Packet inspection statistics [process switch:fast switch]
icmp packets: [0:96]
Session creations since subsystem startup or last reset 2
Current session counts (estab/half-open/terminating) [2:0:0]
Maxever session counts (estab/half-open/terminating) [2:1:0]
Last session created 00:00:32
Last statistic reset never
Last session creation rate 2
Maxever session creation rate 2
Last half-open session total 0
Class-map: class-default (match-any)
Match: any
Drop (default action)
0 packets, 0 bytes
Zone-pair: outside-to-inside
Service-policy inspect : pmap_inbound
Class-map: cmap_inbound (match-any)
Match: protocol icmp
0 packets, 0 bytes
30 second rate 0 bps
Inspect
Session creations since subsystem startup or last reset 0
Current session counts (estab/half-open/terminating) [0:0:0]
Maxever session counts (estab/half-open/terminating) [0:0:0]
Last session created never
Last statistic reset never
Last session creation rate 0
Maxever session creation rate 0
Last half-open session total 0
Class-map: class-default (match-any)
Match: any
Drop (default action)
2 packets, 48 bytes
During a cryptographic process, a clear text message is used with a key and processed by a mathematical function. What is this mathematical function often called?
During asymmetric encryption, which key is exchanged with another party?
0 comments:
Post a Comment