CCNA Security Interview Questions

 
1.
Define the term “DMZ” as it pertains to network security, and name three different common network devices that are typically found there?
2.
Identify the true statements in below
3.
Does the Cisco IOS Firewall feature set act as a stateful or stateless packet filter?
4.
Which of the following are considered parts of the IOS Firewall feature set?
5.
Identify the true statements regarding the Authentication Proxy
6.
Configuring ACLs is an important part of working with the IOS Firewall. What wildcard masks are replaced in ACLs by the words host and any?
7.
Define the term “DMZ” as it pertains to network security, and name three different common network devices that are typically found there?
8.
Identify the true statements in below
9.
Does the Cisco IOS Firewall feature set act as a stateful or stateless packet filter?
10.
Which of the following are considered parts of the IOS Firewall feature set?
11.
Identify the true statements regarding the Authentication Proxy
12.
Configuring ACLs is an important part of working with the IOS Firewall. What wildcard masks are replaced in ACLs by the words host and any?
13.
Define the term “DMZ” as it pertains to network security, and name three different common network devices that are typically found there?
14.
Identify the true statements in below
15.
Does the Cisco IOS Firewall feature set act as a stateful or stateless packet filter?
16.
Which of the following are considered parts of the IOS Firewall feature set?
17.
Identify the true statements regarding the Authentication Proxy
18.
Configuring ACLs is an important part of working with the IOS Firewall. What wildcard masks are replaced in ACLs by the words host and any?
19.
Define the term “DMZ” as it pertains to network security, and name three different common network devices that are typically found there?
20.
Identify the true statements in below
21.
Does the Cisco IOS Firewall feature set act as a stateful or stateless packet filter?
22.
Which of the following are considered parts of the IOS Firewall feature set?
23.
Identify the true statements regarding the Authentication Proxy
24.
Configuring ACLs is an important part of working with the IOS Firewall. What wildcard masks are replaced in ACLs by the words host and any?