Chapter Review Questions

1. Because every company that connects to the Internet has a router, should you deploy security on those routers?

2. What is the value of edge routers being used as choke points, and how effective can they be in increasing your network’s security?

3. Which four features from classic IOS Firewall features have been implemented in the Zone Based Policy Firewall?

4. What are the two major changes to the way you configure IOS Firewall Inspection, as compared to the Cisco IOS Class Firewall?

5. Can the Cisco IOS IDS have multiple points of packet inspection?

6. Temporary access control lists have timers associated with them. Define how they function based on protocol (ICMP, UDP, and TCP).

7. What is the difference between ...

Get Network Security First-Step, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.