blog
    New CCIE Security Core Kn ...
    10 September 09

    New CCIE Security Core Knowledge Questions-Part 2

    Posted byINE
    facebooktwitterlinkedin
    news-featured

    For Part 1 of this series, click here.

    The following questions will be added to the Core Knowledge Simulation once the new version/engine is complete. Enjoy! Answers will be provided in the comments section.

    Implement secure networks using Cisco ASA Firewalls

    The PC at 20.20.20.101 can ping both R1 and the ASA.  Based on the network diagram, what would allow the PC to reach the 10.10.10.0 network?

    asa same-security-traffic

    Implement secure networks using Cisco IOS Firewalls

    Based on the exhibit, what technology is being used, and what traffic is being allowed?

    show policy-map type inspect zone-pair
    Zone-pair: inside-to-outside

    Service-policy inspect : pmap_outbound

    Class-map: cmap_outbound (match-any)
    Match: protocol ssh
    0 packets, 0 bytes
    30 second rate 0 bps
    Match: protocol http
    0 packets, 0 bytes
    30 second rate 0 bps
    Match: protocol icmp
    2 packets, 88 bytes
    30 second rate 0 bps
    Inspect
    Packet inspection statistics [process switch:fast switch]
    icmp packets: [0:96]

    Session creations since subsystem startup or last reset 2
    Current session counts (estab/half-open/terminating) [2:0:0]
    Maxever session counts (estab/half-open/terminating) [2:1:0]
    Last session created 00:00:32
    Last statistic reset never
    Last session creation rate 2
    Maxever session creation rate 2
    Last half-open session total 0

    Class-map: class-default (match-any)
    Match: any
    Drop (default action)
    0 packets, 0 bytes
    Zone-pair: outside-to-inside

    Service-policy inspect : pmap_inbound

    Class-map: cmap_inbound (match-any)
    Match: protocol icmp
    0 packets, 0 bytes
    30 second rate 0 bps
    Inspect
    Session creations since subsystem startup or last reset 0
    Current session counts (estab/half-open/terminating) [0:0:0]
    Maxever session counts (estab/half-open/terminating) [0:0:0]
    Last session created never
    Last statistic reset never
    Last session creation rate 0
    Maxever session creation rate 0
    Last half-open session total 0

    Class-map: class-default (match-any)
    Match: any
    Drop (default action)
    2 packets, 48 bytes

    Implement secure networks using Cisco VPN solutions

    During a cryptographic process, a clear text message is used with a key and processed by a mathematical function. What is this mathematical function often called?

    During asymmetric encryption, which key is exchanged with another party?

    Hey! Don’t miss anything - subscribe to our newsletter!

    © 2022 INE. All Rights Reserved. All logos, trademarks and registered trademarks are the property of their respective owners.
    instagram Logofacebook Logotwitter Logolinkedin Logoyoutube Logo