MCQs
Total Questions : 69
| Page 5 of 7 pages
Answer: Option C. -> Create one Demiliatarized zone
All live servers or workstations are kept in a separate zone than inside and outside to enhance protection.
Answer: Option C. -> Firewall to separate trusted and untrusted network
Firewall create a protective barrier to secure internal network. A antivirus can only detect harmful viruses but cannot stop illegal access by remote attacker.
Answer: Option B. -> It is program that is controlled or emulated section of OS
None.
Answer: Option C. -> Internet to company computer
Connection from internet are never allowed to directly access internal PCs but is routed through DMZ zone to prevent attacks.
Answer: Option C. -> They modify themselves
None.
Answer: Option C. -> One access list may be configured, per direction, for each layer 3 protocol configured on an interface.
Question 47. You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the command show running-configuration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router?
Answer: Option D. -> show ip interface Ethernet 0
Answer: Option C. -> access-list 10 deny 192.168.160.0 0.0.31.255
Answer: Option B. -> access-list 1 deny 172.16.10.1 0.0.0.0
Answer: Option D. -> access-list 10 deny 172.16.48.0 0.0.15.255