blog
New CCIE Security Core Kn ...
10 September 09

New CCIE Security Core Knowledge Questions-Part 2

Posted byINE
facebooktwitterlinkedin
news-featured

For Part 1 of this series, click here.

The following questions will be added to the Core Knowledge Simulation once the new version/engine is complete. Enjoy! Answers will be provided in the comments section.

Implement secure networks using Cisco ASA Firewalls

The PC at 20.20.20.101 can ping both R1 and the ASA.  Based on the network diagram, what would allow the PC to reach the 10.10.10.0 network?

asa same-security-traffic

Implement secure networks using Cisco IOS Firewalls

Based on the exhibit, what technology is being used, and what traffic is being allowed?

show policy-map type inspect zone-pair
Zone-pair: inside-to-outside

Service-policy inspect : pmap_outbound

Class-map: cmap_outbound (match-any)
Match: protocol ssh
0 packets, 0 bytes
30 second rate 0 bps
Match: protocol http
0 packets, 0 bytes
30 second rate 0 bps
Match: protocol icmp
2 packets, 88 bytes
30 second rate 0 bps
Inspect
Packet inspection statistics [process switch:fast switch]
icmp packets: [0:96]

Session creations since subsystem startup or last reset 2
Current session counts (estab/half-open/terminating) [2:0:0]
Maxever session counts (estab/half-open/terminating) [2:1:0]
Last session created 00:00:32
Last statistic reset never
Last session creation rate 2
Maxever session creation rate 2
Last half-open session total 0

Class-map: class-default (match-any)
Match: any
Drop (default action)
0 packets, 0 bytes
Zone-pair: outside-to-inside

Service-policy inspect : pmap_inbound

Class-map: cmap_inbound (match-any)
Match: protocol icmp
0 packets, 0 bytes
30 second rate 0 bps
Inspect
Session creations since subsystem startup or last reset 0
Current session counts (estab/half-open/terminating) [0:0:0]
Maxever session counts (estab/half-open/terminating) [0:0:0]
Last session created never
Last statistic reset never
Last session creation rate 0
Maxever session creation rate 0
Last half-open session total 0

Class-map: class-default (match-any)
Match: any
Drop (default action)
2 packets, 48 bytes

Implement secure networks using Cisco VPN solutions

During a cryptographic process, a clear text message is used with a key and processed by a mathematical function. What is this mathematical function often called?

During asymmetric encryption, which key is exchanged with another party?

Need training for your entire team?

Schedule a Demo

Hey! Don’t miss anything - subscribe to our newsletter!

© 2022 INE. All Rights Reserved. All logos, trademarks and registered trademarks are the property of their respective owners.
instagram Logofacebook Logotwitter Logolinkedin Logoyoutube Logo