Lesson 8 Flashcards

1
Q

The Cisco _____________ is borrowed from IOS to make it easier to implement flexible policies on the security appliances. One or more policies can be applied to traffic flowing through the appliance.

A

Modular Policy Framework ( MPF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • Control what traffic is added to the connection table to allow returning traffic back to the source, as well as examine the payloads of inspected applications for connection, translation, and security issues
A

Inspection of connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • Limit the number of completed and half - open connections on a per - group, per - user, or per - host basis
A

Connection restriction s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • Implement low - latency queuing to prioritize high - priority traffic, like voice, over normal data traffic .
A

Traffic prioritization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • You can rate-limit traffic in both the inbound and outbound directions to control excessive bandwidth needs of applications
A

Traffic policing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • With the AIP-SSM (Advanced Inspection and Prevention Security Services Module) card installed in an ASA, you can define policies to copy packets to or to redirect packets into the AIP - SSM card to look for and prevent attacks.
A

Intrusion prevention system (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • With the CSC-SSM card (Content Security and Control ) installed in an ASA, you can define policies to have traffic redirected through the card to look for viruses, malware, spyware, phishing, and other types of issues with Web , FTP, and email applications.
A

Anti - X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The MPF Process
START
Identify traffic to be subject to the policy. Includes IP addresses and transport protocol port numbers
Create the policy, which specifies the action that permits, denies, or otherwise manipulates the traffic and/or the way it’s handled
Activate the policy by activating it on an interface

A

class-map
policy-map
service-policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Template used to identify a traffic flow by using the match command. A traffic flow is a set of traffic that is identifiable by its packet content. The class - map identifies the traffic that you want to associate one or more policies to

A

class-map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Used to associate one or more actions with a class of traffic. Consists of a list of policies which reference a class map.

A

policy-map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Used to enable a set of policies on an interface or all interfaces.

A

service-policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Supported class maps:

A

Layer 3/4
Inspection (Layer 7)
Regular expressions (“ftp://” )
Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When using class maps, you are required to use _________ to identify the devices and or services, like a particular FTP server.

A

a Layer 3/4 class map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Includes all default application inspection traffic, which is about a 1 ½ dozen protocols such as ftp, rpc , ils , and so on

A

default-inspection-traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Matches on the specified ____ values in the IP header used for QoS.

A

DSCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Matches on the specified TOS values in the IP header used for QoS and in DSCP .

A

precedence

17
Q

Matches on a particular site - to - site connection or on a WebVPN or IPSec remote access group.

A

tunnel - group

18
Q

Further qualifies the matching process when the configured policy is policing: eg, rate - limiting remote access users on a per - destination basis.

A

flow

19
Q

The ASA Firewall listens to the entire FTP transfer conversation on the FTP - control port.

A

Active - mode FTP

it automatically allows the corresponding inbound connection.

20
Q

____. When it’s time to open a data session, instead of sending the PORT command to the server, the client sends a ___ command to the server.

If the FTP server supports Passive mode, it opens a random port of its own and responds with a ____ command to the client , which includes the number of the TCP port it just opened .

A

Passive-Mode FTP

PASV

PORT

21
Q

When more than one policy is associated with the class map, the policies are enforced in the following order :

A
Connection limits, connection timeouts, and TCP sequence number randomization
–
CSC card (Content Security and Control)
–
Stateful and application inspection
–
IPS card
–
Input policing
–
Output policing
–
Priority queuing
22
Q

Configuring a Traffic Class

A

fw1( config )# class - map CLASS_ALL
fw1( config - cmap )# match port tcp eq http
fw1(config - cmap )# match access-list INBOUND-MPF
fw1( config - cmap )# exit

23
Q

Associating a Traffic Class with an Action

A
fw1( config )# policy-map INT_POL 
fw1( config-pmap )#
fw1( config-pmap )# class COMM 
fw1( config-pmap-c)# set connection conn - max 800
24
Q

Applies the policy map to the outside interface

A

fw1( config )# service-policy INT_POL interface outside

25
Q

The security appliance configuration contains a preconfigured ________ that enables inspection of certain applications on all interfaces

A

policy map ( global_policy )

26
Q

default Inspection policy names:

class-map
policy-map

A

inspection_default

global_policy