Sail E0 Webinar

MCQs

Total Questions : 69 | Page 5 of 7 pages
Question 41. What is best practice in firewall domain environment ?
  1.    Create two domain trusted and untrusted domain
  2.    Create strong policy in firewall to support different types of users
  3.    Create one Demiliatarized zone
  4.    Create two DMZ zones with one untrusted domain
 Discuss Question
Answer: Option C. -> Create one Demiliatarized zone


All live servers or workstations are kept in a separate zone than inside and outside to enhance protection.


Question 42. What is used to protect network from outside internet access ?
  1.    A trusted antivirus
  2.    24 hours scanning for virus
  3.    Firewall to separate trusted and untrusted network
  4.    Deny users access to websites which can potentially cause security leak.
 Discuss Question
Answer: Option C. -> Firewall to separate trusted and untrusted network


Firewall create a protective barrier to secure internal network. A antivirus can only detect harmful viruses but cannot stop illegal access by remote attacker.


Question 43. What is known as sandbox ?
  1.    It is a program which can be molded to do desired task.
  2.    It is program that is controlled or emulated section of OS
  3.    It is a special mode of antivirus
  4.    None of the mentioned
 Discuss Question
Answer: Option B. -> It is program that is controlled or emulated section of OS


None.


Question 44. Which direction access cannot happen using DMZ zone by default ?
  1.    Company computer to DMZ
  2.    Internet to DMZ
  3.    Internet to company computer
  4.    Company computer to internet
 Discuss Question
Answer: Option C. -> Internet to company computer


Connection from internet are never allowed to directly access internal PCs but is routed through DMZ zone to prevent attacks.


Question 45. How do viruses avoid basic pattern matchof antivirus ?
  1.    They are encrypted
  2.    They act with special permissions
  3.    They modify themselves
  4.    None of the mentioned
 Discuss Question
Answer: Option C. -> They modify themselves


None.


Question 46.  Which of the following is true regarding access lists applied to an interface?
  1.    You can place as many access lists as you want on any interface until you run out of memory.
  2.    You can apply only one access list on any interface.
  3.    One access list may be configured, per direction, for each layer 3 protocol configured on an interface.
  4.    You can apply two access lists to any interface.
 Discuss Question
Answer: Option C. -> One access list may be configured, per direction, for each layer 3 protocol configured on an interface.
Question 47.  You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the command show running-configuration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router?
  1.    show access-lists
  2.    show interface Ethernet 0
  3.    show ip access-lists
  4.    show ip interface Ethernet 0
 Discuss Question
Answer: Option D. -> show ip interface Ethernet 0
Question 48.  
You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use?
  1.    access-list 10 deny 192.168.160.0 255.255.224.0
  2.    access-list 10 deny 192.168.160.0 0.0.191.255
  3.    access-list 10 deny 192.168.160.0 0.0.31.255
  4.    access-list 10 deny 192.168.0.0 0.0.31.255
 Discuss Question
Answer: Option C. -> access-list 10 deny 192.168.160.0 0.0.31.255
Question 49.  Which of the following is an example of a standard IP access list?
  1.    access-list 110 permit host 1.1.1.1
  2.    access-list 1 deny 172.16.10.1 0.0.0.0
  3.    access-list 1 permit 172.16.10.1 255.255.0.0
  4.    access-list standard 1.1.1.1
 Discuss Question
Answer: Option B. -> access-list 1 deny 172.16.10.1 0.0.0.0
Question 50.  You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with?
  1.    access-list 10 deny 172.16.48.0 255.255.240.0
  2.    access-list 10 deny 172.16.0.0 0.0.255.255
  3.    access-list 10 deny 172.16.64.0 0.0.31.255
  4.    access-list 10 deny 172.16.48.0 0.0.15.255
 Discuss Question
Answer: Option D. -> access-list 10 deny 172.16.48.0 0.0.15.255

Latest Videos

Latest Test Papers