Chapter Review Questions

1. Because every company that connects to the Internet has a router, should you deploy security on those routers?

2. What is the value of edge routers being used as choke points, and how effective can they be in increasing your network’s security?

3. Which four features from classic IOS Firewall features have been implemented in the Zone Based Policy Firewall?

4. What are the two major changes to the way you configure IOS Firewall Inspection, as compared to the Cisco IOS Class Firewall?

5. Can the Cisco IOS IDS have multiple points of packet inspection?

6. Temporary access control lists have timers associated with them. Define how they function based on protocol (ICMP, UDP, and TCP).

7. What is the difference between atomic and compound signatures?

8. What happens when an attacker uses chargen and echo together? How would you stop this from occurring in a Cisco router?

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.137.7