Which ScreenOS security feature helps protect against port scans and denial of service attacks?
Asession-based stateful firewall
BIPsec VPNs
Csecurity policies
DScreen options
What is the function of NAT?
AIt performs Layer 3 routing.
BIt evaluates and redirects matching traffic into secure tunnels.
CIt provides translation between IP addresses.
DIt performs Layer 2 switching.
On a ScreenOS device, which word appears at the beginning of configuration commands?
Aset
Bconfigure
Cenable
Dcommit
Which action does a ScreenOS device perform first when processing a packet?
AIt checks for an existing session.
BIt checks for attacks in the payload.
CIt performs a route lookup.
DIt performs a policy lookup.
On a ScreenOS device, which three processes does the task CPU handle? (Choose three.)
Apolicy evaluation
Btraffic logging
Csession table clean-up
Dmanagement services
Ebroadcast packet processing
A ScreenOS device evaluates five primary elements when performing a security policy check on a new session. Which five elements are evaluated?
Asource IP address, destination IP address, source route, source port, and destination port
Bsource IP address, destination IP address, source port, destination port, and protocol
Csource IP address, destination IP address, source port, destination port, and payload
Ddestination IP address, source port, destination port, protocol, and payload
You want to enable IPv6 on your ScreenOS device.
Which command should you use to accomplish this goal?
Aset envar ipv6=enable
Bset ipv6 enable
Cset envar ipv6=yes
Dset ipv6 yes
Your ScreenOS device does not have a static IP address. You want to be able to access it using its FQDN. How would you implement this task?
AConfigure a domain in DNS.
BConfigure syslog.
CConfigure SNMP.
DConfigure DDNS.
You have just installed a new ScreenOS device in your network and you want only a select range of IP addresses to have administrative access to the device.
Which choice will allow you to accomplish this?
AConfigure a manager IP.
BConfigure the management interface.
CConfigure a management IP on the trust interface.
DConfigure new system administrators.
You have two interfaces in ZoneA and traffic is passing without any policy configured. You want to control the traffic between the two interfaces.
Which two actions will allow this to happen? (Choose two.)
AConfigure interzone blocking on ZoneA and create a policy in that zone to control the traffic.
BConfigure intrazone blocking on ZoneA and create a policy in that zone to control the traffic.
CMove one of the interfaces to a different zone and create an interzone policy to control the traffic.
DMove one of the interfaces to a different zone and create an intrazone policy to control the traffic.
What is an aggregate interface?
AAn aggregate interface binds two physical interfaces together to create a redundant interface.
BAn aggregate interface binds two or more physical interfaces that share the traffic load.
CAn aggregate interface is the management interface.
DAn aggregate interface is used for VPN tunnels.
Which two statements are true about redundant interfaces? (Choose two.)
AYou can bind two physical interfaces together to create one redundant interface.
BRedundant interfaces bind to a security zone; one physical interface acts as the primary interface, and the other physical interface acts as the secondary interface.
CA redundant interface is the accumulation of two or more physical interfaces that share the same traffic load.
DA redundant interface is the management interface for bridge mode.
Which two actions are performed by a read/write vsys administrator? (Choose two.)
AView the security associations for all virtual systems.
BConfigure a vsys address book entry.
CModify the vsys administrator login name.
DModify the vsys read/write administrator password.
When you create a new virtual system, which zone is automatically created within the vsys-specific VR?
Atrust zone
Buntrust zone
Cshared zone
Dnull zone
What is the purpose of a virtual system profile?
Ato limit virtual system access
Bto limit virtual system resources
Cto limit the number of virtual system interfaces
Dto limit the number of VPNs
What is required to route traffic from one virtual system to another virtual system?
AConfigure the same dynamic routing protocol in each virtual system.
BConfigure a virtual system profile with a shared forwarding table.
CConfigure a private virtual router in each virtual system.
DConfigure a shared root-level virtual router.
Policy-based routing (PBR) policies can be bound to which three ScreenOS objects? (Choose three.)
Avirtual routers
Binterfaces
Czones
Dsecurity policies
Evirtual system
Policy-based routing consists of which three ScreenOS objects? (Choose three.)
Aextended access lists
Bmatch groups
Caction groups
Daddress books
Esecurity policy
What are two routing tables contained in a virtual router? (Choose two.)
Adestination-based
BNHTB
Csource-based
Dzone-based
Which dynamic routing protocol does IPv6 use?
ARIP
BRIPng
COSPFv2
DNHRP
A routing table contains an IBGP route, a RIP route, an OSPF external Type 2 route, and an EBGP route for 192.168.0.0/16. When the router receives traffic destined for, which route will the router use by default?
Athe EBGP route
Bthe IBGP route
Cthe OSPF route
Dthe RIP route
A routing table contains an IBGP route for 192.168.0.0/24, a RIP route for 192.168.0.0/23, an OSPF route for 192.168.0.0/22, and a static route for 192.168.0.0/16.
When the router receives traffic destined for 192.168.0.1, which route will the router use?