1) Which of the following are the correct options for the firewall Security Policy? [A] You need to configure the Security Policy to permit traffic from the Untrust Zone to the Local Zone, otherwhise communication will not be able to be possible [B] You need to configure the Security Policy to permit traffic from the Untrust Zone to the Trust Zone, otherwhise you will not be able to communicate [C] You do not need to configure the Security Policy to permit traffic from the Trust Zone to the Local Zone, and you can communicate directly [D] You need to configure the Security Policy to permit traffic from the DMZ Zone to the Trust Zone. Otherwhise you cannot communicate
2)Session based stateful inspection firewalls process the first and subsequent packets in different ways. Which of the following statements are correct? [A] When the started inspection mechanism is enabled a firewall checks subsequent packets using the security policy [B] When the started inspection mechanism is enabled a firewall creates sessions only for SYN packets in TCP flows [C] When receiving a packet a firewall searches the sesion table. If no entry matches the firewall processes the packet as the first packet [D] When receiving a packet a firewall searches the sesion table. If no entry matches the firewall processes the packet as a subsequent packet
I think the answer to the 1st is ABD. on the firewall, all interzone security policies are deny by default. Security policies must be configured for inter-area communication.
I think the answer to the 1st is ABD. on the firewall, all interzone security policies are deny by default. Security policies must be configured for inter-area communication.
Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
Politically sensitive content
Content concerning pornography, gambling, and drug abuse
Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."