NOTE : - THIS ALL QUESTIONS ARE RELATED TO NETWORK SECURITY II - PACKET TRACER CISCO IOS
Question:
NOTE : - THIS ALL QUESTIONS ARE RELATED TO NETWORK SECURITY II - PACKET TRACER CISCO IOS DEVICES ! NO SPINNING , NEED NO PLAGAIRSM
1) Please explain in your own words, what Security Associations are and how they are used?
2) please describe an IKE Transform Set? 3) A packet is received on an interface on a Cisco firewall. An ACL is configured inbound on that interface. The packet matches the second and fourth access control entries of the ACL. What happens to the packet? Explain WHY ? 4) When creating a site-to-site IPSec VPN on a Cisco IOS router using digital signatures for authentication, an ISAKMP profile is required to facilitate authentication. 5) Name 3 different techniques that can be used to mitigate BYOD risk and describe how each one works. 6) You have three servers in your DMZ providing public web, mail and DNS services for your organization. Your border firewall has a single public IP address connecting your network to the Internet. Which type of NAT do you configure to allow hosts on the Internet to access your organizations services hosted in your DMZ?
Statistics For Business And Economics
ISBN: 9780132745659
8th Edition
Authors: Paul Newbold, William Carlson, Betty Thorne