Sep
10

For Part 1 of this series, click here.

The following questions will be added to the Core Knowledge Simulation once the new version/engine is complete. Enjoy! Answers will be provided in the comments section.

Implement secure networks using Cisco ASA Firewalls

The PC at 20.20.20.101 can ping both R1 and the ASA.  Based on the network diagram, what would allow the PC to reach the 10.10.10.0 network?

asa same-security-traffic

Implement secure networks using Cisco IOS Firewalls

Based on the exhibit, what technology is being used, and what traffic is being allowed?

show policy-map type inspect zone-pair
Zone-pair: inside-to-outside

Service-policy inspect : pmap_outbound

Class-map: cmap_outbound (match-any)
Match: protocol ssh
0 packets, 0 bytes
30 second rate 0 bps
Match: protocol http
0 packets, 0 bytes
30 second rate 0 bps
Match: protocol icmp
2 packets, 88 bytes
30 second rate 0 bps
Inspect
Packet inspection statistics [process switch:fast switch]
icmp packets: [0:96]

Session creations since subsystem startup or last reset 2
Current session counts (estab/half-open/terminating) [2:0:0]
Maxever session counts (estab/half-open/terminating) [2:1:0]
Last session created 00:00:32
Last statistic reset never
Last session creation rate 2
Maxever session creation rate 2
Last half-open session total 0

Class-map: class-default (match-any)
Match: any
Drop (default action)
0 packets, 0 bytes
Zone-pair: outside-to-inside

Service-policy inspect : pmap_inbound

Class-map: cmap_inbound (match-any)
Match: protocol icmp
0 packets, 0 bytes
30 second rate 0 bps
Inspect
Session creations since subsystem startup or last reset 0
Current session counts (estab/half-open/terminating) [0:0:0]
Maxever session counts (estab/half-open/terminating) [0:0:0]
Last session created never
Last statistic reset never
Last session creation rate 0
Maxever session creation rate 0
Last half-open session total 0

Class-map: class-default (match-any)
Match: any
Drop (default action)
2 packets, 48 bytes

Implement secure networks using Cisco VPN solutions

During a cryptographic process, a clear text message is used with a key and processed by a mathematical function. What is this mathematical function often called?

During asymmetric encryption, which key is exchanged with another party?

INE Instructor
About INE Instructor

Subscribe to INE Blog Updates

New Blog Posts!