0 of 10 Questions completed
Questions:
You have already completed the simulator before. Hence you can not start it again.
Simulator is loading…
You must sign in or sign up to start the simulator.
You must first complete the following:
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Refer to the following firewall table:
Rule# |
Source IP |
Destination IP |
Port |
Allow/Block |
---|---|---|---|---|
1 |
5.5.5.5 |
20.5.30.40 |
443 |
allow |
2 |
Any |
20.5.30.140 |
25 |
allow |
3 |
Any |
Any |
Any |
block |
Categorize the following traffic flows as ALLOWED or BLOCKED through the firewall:
Transfer emails from 1.2.3.4 to 20.5.30.140
Request a secured web page on 20.5.30.40 from 5.5.5.5
Perform a DNS query from 10.1.10.88 to 9.9.9.9
Refer to the following firewall table:
Rule# |
Source IP |
Destination IP |
Port |
Allow/Block |
---|---|---|---|---|
1 |
Any |
Any |
53 |
allow |
2 |
Any |
Any |
123 |
allow |
3 |
Any |
Any |
Any |
block |
Categorize the following traffic flows as ALLOWED or BLOCKED through the firewall:
Synchronize the clock on a server at 99.99.99.4 from 88.88.88.1
Perform a DNS query from 4.5.6.7 to 7.6.5.4
Request an unsecured web page on 20.5.30.140
Request a secured web page on 20.5.30.140
Use SSH connection to connect to 20.5.30.140
Refer to the following firewall table:
Rule# |
Source IP |
Destination IP |
Port |
Allow/Block |
---|---|---|---|---|
1 |
Any |
20.5.30.40 |
22 |
allow |
2 |
Any |
20.5.30.140 |
80 |
allow |
3 |
Any |
Any |
Any |
block |
Categorize the following traffic flows as ALLOWED or BLOCKED through the firewall:
Use SSH connection to connect to 20.5.30.40
Use SSH connection to connect to 20.5.30.140
Request an unsecured web page on 20.5.30.140
Request a secured web page on 20.5.30.140
Configure the following stateful firewall rules:
• Allow the File Server to access the Database Server using LDAP
• Block the Storage Server to transfer files to the Web Server using FTP
• Allow the FTP Server to transfer files to the Mail Server over HTTPS
Rule# |
Source IP |
Destination IP |
Port |
Allow/Block |
---|---|---|---|---|
1 |
|
|
|
|
2 |
|
|
|
|
3 |
|
|
|
|
Configure the following stateful firewall rules:
• Block the Web Server to access the Database Server using LDAP
• Allow the Storage Server to transfer files to the Web Server using SFTP
• Allow the Mail Server to transfer emails to the Storage Server using SMTP
Rule# |
Source IP |
Destination IP |
Port |
Allow/Block |
---|---|---|---|---|
1 |
|
|
|
|
2 |
|
|
|
|
3 |
|
|
|
|
Configure the following stateful firewall rules:
• Allow PC_1 to access the website dojopass.org over HTTPS
• Block PC_2 to access the Database Server using LDAP
• Allow PC_2 to transfer files to the FTP server
Rule# |
Source IP |
Destination IP |
Port |
Allow/Block |
---|---|---|---|---|
1 |
|
|
|
|
2 |
|
|
|
|
3 |
|
|
|
|
Configure the following stateful firewall rules:
• Block PC_1 to transfer files to the FTP server
• Block PC_2 to access the website dojopass.org over HTTP
• Allow PC_2 to access the website dojopass.org over HTTPS
Rule# |
Source IP |
Destination IP |
Port |
Allow/Block |
---|---|---|---|---|
1 |
|
|
|
|
2 |
|
|
|
|
3 |
|
|
|
|
Configure the following stateful firewall rules:
• Block PC_2 to retrieve files from the FTP server
• Allow PC_1 to retrieve files from the FTP server
• Block PC_2 to access the internet over HTTP
Rule# |
Source IP |
Destination IP |
Port |
Allow/Block |
---|---|---|---|---|
1 |
|
|
|
|
2 |
|
|
|
|
3 |
|
|
|
|
Refer to the following firewall table:
Rule# |
Source IP |
Destination IP |
Port |
Allow/Block |
---|---|---|---|---|
1 |
Any |
80.3.20.30 |
21 |
allow |
2 |
Any |
120.50.25.40 |
443 |
allow |
3 |
Any |
Any |
Any |
block |
Categorize the following traffic flows as ALLOWED or BLOCKED through the firewall:
Use FTP to retrieve files from the server 120.50.25.40
Use SSH connection to connect to 80.3.20.30
Request a secured web page on 120.50.25.40
Request an unsecured web page on 80.3.20.30
Use FTP to retrieve files from the server 80.3.20.30
Refer to the following firewall table:
Rule# |
Source IP |
Destination IP |
Port |
Allow/Block |
---|---|---|---|---|
1 |
89.56.22.2 |
70.2.1.56 |
80 |
block |
2 |
Any |
Any |
67/68 |
allow |
3 |
Any |
Any |
Any |
block |
Categorize the following traffic flows as ALLOWED or BLOCKED through the firewall:
Access the web server 70.2.1.56 over HTTP using the workstation with IP 89.56.22.2
Access the web server 70.2.1.56 over HTTP using the workstation with IP 120.50.25.40
Assign a dynamic IP address to the printer
Request a secured web page on 70.2.1.56