For Part 1 of this series, click here.
The following questions will be added to the Core Knowledge Simulation once the new version/engine is complete. Enjoy! Answers will be provided in the comments section.
Implement secure networks using Cisco ASA Firewalls
The PC at 20.20.20.101 can ping both R1 and the ASA. Based on the network diagram, what would allow the PC to reach the 10.10.10.0 network?
Implement secure networks using Cisco IOS Firewalls
Based on the exhibit, what technology is being used, and what traffic is being allowed?
During a cryptographic process, a clear text message is used with a key and processed by a mathematical function. What is this mathematical function often called?
During asymmetric encryption, which key is exchanged with another party?
The following questions will be added to the Core Knowledge Simulation once the new version/engine is complete. Enjoy! Answers will be provided in the comments section.
Implement secure networks using Cisco ASA Firewalls
The PC at 20.20.20.101 can ping both R1 and the ASA. Based on the network diagram, what would allow the PC to reach the 10.10.10.0 network?
Implement secure networks using Cisco IOS Firewalls
Based on the exhibit, what technology is being used, and what traffic is being allowed?
show policy-map type inspect zone-pair Zone-pair: inside-to-outside Service-policy inspect : pmap_outbound Class-map: cmap_outbound (match-any) Match: protocol ssh 0 packets, 0 bytes 30 second rate 0 bps Match: protocol http 0 packets, 0 bytes 30 second rate 0 bps Match: protocol icmp 2 packets, 88 bytes 30 second rate 0 bps Inspect Packet inspection statistics [process switch:fast switch] icmp packets: [0:96] Session creations since subsystem startup or last reset 2 Current session counts (estab/half-open/terminating) [2:0:0] Maxever session counts (estab/half-open/terminating) [2:1:0] Last session created 00:00:32 Last statistic reset never Last session creation rate 2 Maxever session creation rate 2 Last half-open session total 0 Class-map: class-default (match-any) Match: any Drop (default action) 0 packets, 0 bytes Zone-pair: outside-to-inside Service-policy inspect : pmap_inbound Class-map: cmap_inbound (match-any) Match: protocol icmp 0 packets, 0 bytes 30 second rate 0 bps Inspect Session creations since subsystem startup or last reset 0 Current session counts (estab/half-open/terminating) [0:0:0] Maxever session counts (estab/half-open/terminating) [0:0:0] Last session created never Last statistic reset never Last session creation rate 0 Maxever session creation rate 0 Last half-open session total 0 Class-map: class-default (match-any) Match: any Drop (default action) 2 packets, 48 bytesImplement secure networks using Cisco VPN solutions
During a cryptographic process, a clear text message is used with a key and processed by a mathematical function. What is this mathematical function often called?
During asymmetric encryption, which key is exchanged with another party?
0 comments:
Post a Comment