| ]

Here you will find answers to Cisco IOS Firewall questions:

Question 1

Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set? (Choose two)

A - It can be used to block bulk encryption attacks.
B - It can be used to protect against denial of service attacks.
C - Traffic originating from the router is considered trusted, so it is not inspected.
D - Based upon the custom firewall rules, an ACL entry is statically created and added to the existing ACL permanently.
E - Temporary ACL entries that allow selected traffic to pass are created and persist for the duration of the communication session.

Answer: B E

Question 2

Study this exhibit carefully. What information can be derived from the SDM firewall configuration displayed?

NetworkTut# show running-config | include access-list
Access-list 100 remark Autogenerated by SDM firewall configuration
Access-list 100 remark SDM_ACL Category=1
Access-list 100 deny ip 200.0.0.0 0.0.0.3 any
Access-list 100 deny ip host 255.255.255.255 any
Access-list 100 deny ip 127.0.0.0 0.255.255.255 any
Access-list 100 permit ip any any
Access-list 101 remark Autogenerated by SDM firewall configuration
Access-list 101 remark SDM_ACL Category=1
Access-list 101 deny ip 10.1.1.0 0.0.0.255 any
Access-list 101 permit icmp any host 200.0.0.1 echo-reply
Access-list 101 permit icmp any host 200.0.0.1 time-exceeded
Access-list 101 permit icmp any host 200.0.0.1 unreachable
Access-list 101 deny ip 10.0.0.0 0.255.255.255 any
Access-list 101 deny ip 172.16.0.0 0.15.255.255 any
Access-list 101 deny ip 192.168.0.0 0.0.255.255 any
Access-list 101 deny ip 127.0.0.0 0.255.255.255 any
Access-list 101 deny ip host 255.255.255.255 any
Access-list 101 deny ip host 0.0.0.0 any
Access-list 101 deny ip any any log

A - Access-list 101 was configured for the trusted interface, and access-list 100 was configured for the untrusted interface.
B - Access-list 100 was configured for the trusted interface, and access-list 101 was configured for the untrusted interface.
C - Access-list 100 was configured for the inbound direction, and access-list 101 was configured for the outbound direction on the trusted interface.
D - Access-list 100 was configured for the inbound direction, and access-list 101 was configured for the outbound direction on the untrusted interface.

Answer: B

Explanation:

The last line of access-list 100 is used to "permit" all the traffic so it is the inside (trusted) interface. The last line of access-list 101 is used to "deny" all traffic so it is the outside (untrusted) interface.

Question 3

Which three statements accurately describe IOS Firewall configurations ? (Choose three)

A - The IP inspection rule can be applied in the inbound direction on the secured interface.
B - The IP inspection rule can be applied in the outbound direction on the unsecured interface.
C - The ACL applied in the inbound direction on the unsecured interface should be an extended ACL.
D - For temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for the returning traffic must be a standard ACL.

Answer: A B C