CCNA Security v2.0 Chapter 4 Exam Answers
CCNA Security v2.0 Chapter 4 Exam Answers
CCNA Security v2.0 Chapter 4 Exam Answers
Net
o echo request
o time-stamp request
o echo reply
o time-stamp reply
o router advertisement
CCNA 5 Page 1
CCNA Security v2.0 Chapter 4 Exam Answers WWW.CCNA-v5.Net
o Traffic that originates from the inside interface is generally blocked entirely or very
selectively permitted to the outside interface.
o Traffic that originates from the DMZ interface is selectively permitted to the outside
interface.
o Traffic that originates from the outside interface is permitted to traverse the firewall to
the inside interface with few or no restrictions.
o Return traffic from the inside that is associated with traffic originating from the
outside is permitted to traverse from the inside interface to the outside interface.
o Return traffic from the outside that is associated with traffic originating from the
inside is permitted to traverse from the outside interface to the DMZ interface.
5. Refer to the exhibit. Which statement describes the function of the ACEs?
7. In addition to the criteria used by extended ACLs, what conditions are used by
a classic firewall to filter traffic?
CCNA 5 Page 2
CCNA Security v2.0 Chapter 4 Exam Answers WWW.CCNA-v5.Net
8. A router has been configured as a classic firewall and an inbound ACL applied
to the external interface. Which action does the router take after inbound-to-
outbound traffic is inspected and a new entry is created in the state table?
o When traffic returns from its destination, it is reinspected, and a new entry is added
to the state table.
o The internal interface ACL is reconfigured to allow the host IP address access to the
Internet.
o The entry remains in the state table after the session is terminated so that it can be
reused by the host.
o A dynamic ACL entry is added to the external interface in the inbound direction.
9. If the provided ACEs are in the same ACL, which ACE should be listed first in
the ACL according to best practice?
10. A company is deploying a new network design in which the border router has
three interfaces. Interface Serial0/0/0 connects to the ISP, GigabitEthernet0/0
connects to the DMZ, and GigabitEthernet/01 connects to the internal private
network. Which type of traffic would receive the least amount of inspection
(have the most freedom of travel)?
11. Refer to the exhibit. The ACL statement is the only one explicitly configured on
the router. Based on this information, which two conclusions can be drawn
regarding remote access network connections? (Choose two.)
CCNA 5 Page 3
CCNA Security v2.0 Chapter 4 Exam Answers WWW.CCNA-v5.Net
o SSH connections from the 192.168.2.0/24 network to the 192.168.1.0/24 network are
allowed.
o Telnet connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network
are allowed.
o Telnet connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network
are blocked.
o SSH connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are
allowed.
o SSH connections from the 192.168.1.0/24 network to the 192.168.2.0/24 network are
blocked.
o Telnet connections from the 192.168.2.0/24 network to the 192.168.1.0/24 network
are allowed.
o Only the network device assigned the IP address 192.168.10.1 is allowed to access
the router.
o Devices on the 192.168.10.0/24 network are not allowed to reply to any ping
requests.
o Only Layer 3 connections are allowed to be made from the router to any other
network device.
o Devices on the 192.168.10.0/24 network are not allowed to ping other devices on the
192.168.11.0 network.
o A Telnet or SSH session is allowed from any device on the 192.168.10.0 into the
router with this access list assigned.
13. What is one benefit of using a stateful firewall instead of a proxy server?
CCNA 5 Page 4
CCNA Security v2.0 Chapter 4 Exam Answers WWW.CCNA-v5.Net
15. When a Cisco IOS Zone-Based Policy Firewall is being configured via CLI,
which step must be taken after zones have been created?
17. Which two rules about interfaces are valid when implementing a Zone-Based
Policy Firewall? (Choose two.)
o If one interface is a zone member, but the other is not, all traffic will be passed.
o If neither interface is a zone member, then the action is to pass traffic.
o If both interfaces are members of the same zone, all traffic will be passed.
o If one interface is a zone member and a zone-pair exists, all traffic will be passed.
o If both interfaces belong to the same zone-pair and a policy exists, all traffic will be
passed.
o show interfaces
o show zones
o show running-config
o show protocols
19. Refer to the exhibit. The network A contains multiple corporate servers that
are accessed by hosts from the Internet for information about the corporation.
What term is used to describe the network marked as A?
CCNA 5 Page 5
CCNA Security v2.0 Chapter 4 Exam Answers WWW.CCNA-v5.Net
o internal network
o untrusted network
o perimeter security boundary
o DMZ
o multicast packet
o ICMP packet
o broadcast packet
o router-generated packet
21. When a Cisco IOS Zone-Based Policy Firewall is being configured, which two
actions can be applied to a traffic class? (Choose two.)
o drop
o log
o forward
o hold
o inspect
o copy
CCNA 5 Page 6
CCNA Security v2.0 Chapter 4 Exam Answers WWW.CCNA-v5.Net
CCNA 5 Page 7