Your network is a mixed environment of Windows, Linux, and UNIX, computers. The routers are primarily
Cisco and the network uses a T-1 to connect to the Internet. You are experimenting with setting up a mail server in a production environment for internal use only. You do not want this mail server to receive any requests from anywhere but the internal network. Therefore you have decided to block incoming SMTP traffic at the Firewall. Which port will you block at the Firewall?
During a network packet capture in Wireshark, you capture ICMP traffic, and are analyzing this capture.
In an ICMP Message, what is the function of the first eight bits?
A router has two active Ethernet interfaces. Interface E0 is connected to network 10.10.0.0/16 while
Interface E1 is connected to network 10.11.0.0/16. You are configuring access control lists to manage specific access, which is disallowed on these segments. The configuration of the lists are as follows:
router(config)#access-list 123 deny tcp 10.11.0.0 0.0.255.255 10.10.0.0 0.0.255.255 eq 20
router(config)#access-list 123 deny tcp 10.11.0.0 0.0.255.255 10.10.0.0 0.0.255.255 eq 21
router(config)#access-list 123 deny tcp 10.10.0.0 0.0.255.255 10.11.0.0 0.0.255.255 eq 20
router(config)#access-list 123 deny tcp 10.10.0.0 0.0.255.255 10.11.0.0 0.0.255.255 eq 21
router(config)#access-list 123 permit tcp 0.0.0.0 255.255.255.255 0.0.0.0 255.255.255.255
router(config)#Interface Ethernet 0
router(config-if)#ip access-group 123 in
router(config-if)#Interface Ethernet 1
router(config-if)#ip access-group 123 in
Based on the above list configuration, which of the following statements is true on the router?
Your organization has extensive resources that you must make available to authorized users, through your ISA Server 2006. From the following answers, select the one that is not a feature of ISA Server Content Publishing:
You are going to configure your SuSe Linux computer to run Snort as your IDS. Prior to running Snort, you wish to configure Apache and PHP, so you may use Snort monitoring tools in the browser. You need to verify that Apache and PHP are running properly. What line needs to be entered in the info.php file to test PHP on your Apache server?
You are building the rules for your newly installed ISA Server 2006. There are three basic rule types:
Access rules, Publishing rules, and Network rules. Which of the following best describes Access rules and Publishing rules?
Your network is going to implement a new network security solution, and as part of this you are configuring IPSec on a Windows Server 2003 machine. Which of the following is the description of the Client (Respond Only) default IPSec Policy?