Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Kingdom of Saudi Arabia

Technical and vocational training corporation


second semester

Name: Ebtehaj Alharbi


 what is the AMP for endpoints, AMP for networking, and
AMP for content security, and what of each one
integrates with cisco?

1. Endpoints: Endpoints integrate with Cisco AMP for Networks so delivers


comprehensive protection across extended networks and endpoints.
2. Networking: Provides a network-based solution and is integrated into dedicated
Cisco ASA Firewall and Cisco FirePOWER network security appliances.
3. Content Security: its feature in Cisco Cloud Web Security or Cisco Web and Email
Security Appliances to protect against email and web-based advanced malware
attacks.

 What are the benefits of Cisco email security solutions?

1. Global threat intelligence


2. Spam blocking
3. Advanced malware protection
4. Outbound message control

 What are the Three ways to grant sponsor permissions?


1. Only for accounts that have been created by the sponsor.
2. To all accounts.
3. To no accounts.

 What are the Layer 2 attacks?


1. CAM table Attack.
2. STP Attack.
3. Address spoofing attack.
4. ARP attack.
5. DHCP attack.
6. VLAN attack.

1
Kingdom of Saudi Arabia
Technical and vocational training corporation
second semester

 What is the CAM table attack?


Overflow attack

 What are the Security Violation Modes?


1. Protect.
2. Restrict.
3. Shutdown.

 What are the DHCP attacks?

1. DHCP spoofing attack.


2. DHCP starvation attack.

2
Kingdom of Saudi Arabia
Technical and vocational training corporation
second semester

 What are the two possible levels of IP traffic security


filtering?
1. Source IP address filter.
2. Source IP and MAC address filter.

 Determine the root and the best path for it from E


The path from E to C to A (root) is the lowest cost = 8

 what are the VPN Benefits?


1. Cost Savings.
2. Security.
3. Scalability.
4. Compatibility.

 what are the types of VPNs?


1. Remote-Access VPN.
2. Site-to-Site VPN Access.

 what is the difference between AH and ESP?


1. AH: provides data integrity by using authentication and doesn’t encrypt the packet.
2. ESP: provides data integrity with authentication and protects the packet with an
encryption.

3
Kingdom of Saudi Arabia
Technical and vocational training corporation
second semester

 what is the work of firewalls?


Firewall examine all the data packets passing through them to see if they meet the rules
made by the administrator of the network.

 what are the types of firewalls and in any layers?


1. Packet Filtering Firewall.

2. Application Gateway Firewall.

3. Stateful Firewall.

4. NAT Firewall.

4
Kingdom of Saudi Arabia
Technical and vocational training corporation
second semester

 what are the benefits of stateful firewalls?


1. Primary means defense.
2. Strong packet filtering.
3. Improved performance over packet filtering.
4. Defends against spoofing and Dos attacks.
5. Richer data log.

 what is the DMZ?


Sub-network that is behind the firewall but that is open to the public

 what is the Firewall best practices?


1. Choose the internal and external interfaces.
2. Configure ACLs for each interface.
3. Define inspection rules.
4. Apply an inspection rule to an interface.

 what is the ZPF?


Interfaces are assigned to security zones, and firewall policy is applied to traffic moving
between the zones.

 what are the benefits of ZPF?


1. Not dependent on ACLs.
2. Policies are easy to read.
3. Router security posture is to block unless explicitly allowed.
4. One policy affects any given traffic.

 what are the design steps of ZPF?


1. Determine the zones.
2. Establish policies between zones.
3. Design the physical infrastructure.
4. Identify subsets within zones and merge traffic requirements.

 what are the ZPF actions?


1. Inspect.
2. Drop.
3. Pass.

You might also like