Datasheet

9E0 - 100
Leading the way in IT testing and certification tools, www.testking.com
- 35 -
• Internet Protocol (IP)
• NetBIOS over IP (Microsoft Networking)
• Point-to-Point Tunneling Protocol (PPTP)
• Simple Network Management Protocol (SNMP)
• Sitara Networks Protocol (SNP)
• SQL*Net (Oracle client/server protocol)
• Sun Remote Procedure Call (RPC) services, including Network File System (NFS)
• Telnet
• Transmission Control Protocol (TCP)
• Trivial File Transfer Protocol (TFTP)
• User Datagram Protocol (UDP)
• RFC 1700
Reference:
Cisco PIX Firewall Software - TCP/IP Reference Information
QUESTION NO: 67
Which type of ACL is allowed when implementing the Cisco IDS IP blocking feature
using post-shun ACLs?
A. Numbered IP extended
B. Named IPX extended
C. Numbered IP standard
D. Numbered IPX standard
Answer: A
Explanation: Extended ACLs enable you to create fine-tuned filtering policies.
Reference: Cisco Secure Intrusion Detection System (Ciscopress) page 464
QUESTION NO: 68
What reconnaissance methods are used to discover servers running SMTP and SNMP?
(Choose two)
A. TCP scans for port 25
B. UDP scans for port 25
C. UDP scans for port 161
D. ICMP sweeps for port 25
E. ICMP sweeps for port 161