background image
Q&A 583
20
Name three layers that CBAC examines.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
21
Which has the stronger authentication mechanism--enable secret or enable password?
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
22
With CBAC, which feature is needed to prevent denial-of-service attacks?
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
23
Where should extended access lists be applied--closest to the source or the destination?
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
24
What is a perimeter router?
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
25
For what does ISAKMP stand?
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
26
What RFC is NAT?
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
87200333.book Page 583 Wednesday, August 22, 2001 1:41 PM