Home > Firewall & Intrusion Prevention 2

Firewall & Intrusion Prevention 2

September 4th, 2020 Go to comments

Question 1

Question 2

Explanation

The ASAv on AWS supports the following features:
+ Support for Amazon EC2 C5 instances, the next generation of the Amazon EC2 Compute Optimized instance family.
+ Deployment in the Virtual Private Cloud (VPC)
+ Enhanced networking (SR-IOV) where available
+ Deployment from Amazon Marketplace
+ Maximum of four vCPUs per instance
+ User deployment of L3 networks
+ Routed mode (default)

Note: The Cisco Adaptive Security Virtual Appliance (ASAv) runs the same software as physical Cisco ASAs to deliver proven security functionality in a virtual form factor. The ASAv can be deployed in the public AWS cloud. It can then be configured to protect virtual and physical data center workloads that expand, contract, or shift their location over time.

Reference: https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/asav/quick-start-book/asav-96-qsg/asav-aws.html

Question 3

Question 4

Question 5

Explanation

The ASA and ASASM implementations of NetFlow Secure Event Logging (NSEL) provide a stateful, IP flow tracking method that exports only those records that indicate significant events in a flow.

The significant events that are tracked include flow-create, flow-teardown, and flow-denied (excluding those flows that are denied by EtherType ACLs).

Reference: https://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/general/asa-general-cli/monitor-nsel.html

Question 6

Question 7

Explanation

The Firepower System uses network discovery and identity policies to collect host, application, and user data for traffic on your network. You can use certain types of discovery and identity data to build a comprehensive map of your network assets, perform forensic analysis, behavioral profiling, access control, and mitigate and respond to the vulnerabilities and exploits to which your organization is susceptible.

You can configure your network discovery policy to perform host and application detection.

Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/introduction_to_network_discovery_and_identity.html

Question 8

Question 9

Explanation

The purpose of above commands is to redirect traffic that matches the ACL “redirect-acl” to the Cisco FirePOWER (SFR) module in the inline (normal) mode. In this mode, after the undesired traffic is dropped and any other actions that are applied by policy are performed, the traffic is returned to the ASA for further processing and ultimate transmission.

The command “service-policy global_policy global” applies the policy to all of the interfaces.

Reference: https://www.cisco.com/c/en/us/support/docs/security/asa-firepower-services/118644-configure-firepower-00.html

Question 10

Explanation

Cisco Firepower deployments can take advantage of platform settings policies. A platform settings policy is a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in your deployment, such as time settings and external authentication. Examples of these platform settings policies are time and date settings, external authentication, and other common administrative features.

A shared policy makes it possible to configure multiple managed devices at once, which provides consistency in your deployment and streamlines your management efforts. Any changes to a platform settings policy affects all the managed devices where you applied the policy. Even if you want different settings per device, you must create a shared policy and apply it to the desired device.

For example, your organization’s security policies may require that your appliances have a “No Unauthorized Use” message when a user logs in. With platform settings, you can set the login banner once in a platform settings policy.

Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/platform_settings_policies_for_managed_devices.html

Therefore the answer should be “Platform Settings Policy”, not “Platform Service Policy” but it is the best answer here so we have to choose it.

Question 11

Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two)

A. Enable NetFlow Version 9.
B. Create an ACL to allow UDP traffic on port 9996.
C. Apply NetFlow Exporter to the outside interface in the inbound direction.
D. Create a class map to match interesting traffic.
E. Define a NetFlow collector by using the flow-export command.

 

Answer: D E

Explanation

In order to configure NetFlow on Cisco ASA 5500 Series firewall, we need the following minimum steps:

1. Configuring NSEL Collectors:
flow-export destination interface-name ipv4-address | hostname udp-port
For example: hostname (config)# flow-export destination inside 209.165.200.225 2002

The destination keyword indicates that a NSEL collector is being configured. The interface-name argument is the name of the ASA and ASA Services Module interface through which the collector is reached. The ipv4-address argument is the IP address of the machine running the collector application. The hostname argument is the destination IP address or name of the collector. The udp-port argument is the UDP port number to which NetFlow packets are sent.

(-> Therefore we only need to let the firewall know the IP address that the NetFlow “Collector” will be running on. We don’t need to apply the NetFlow Exporter to any interface -> Answer C is not correct)

2. Defines the class map that identifies traffic for which NSEL events need to be exported.
3. Defines the policy map to apply flow-export actions to the defined classes.
4. Adds or edits the service policy globally.

An example of configuring NetFlow is shown below (using minimum configuration):

ASA(config)# flow-export destination inside 10.254.254.234 2055 //Note: “inside” is the interface name of ASA through which the collector is reached
ASA(config)# policy-map global_policy
ASA(config-pmap)# class class-default
ASA(config-pmap-c)# flow-export event-type all destination 10.254.254.234
ASA(config)# service-policy global_policy global

Question 12

A mall provides security services to customers with a shared appliance. The mall wants separation of management on the shared appliance. Which ASA deployment mode meets these needs?

A. routed mode
B. transparent mode
C. multiple context mode
D. multiple zone mode

 

Answer: C

Question 13

What is a characteristic of Firepower NGIPS inline deployment mode?

A. ASA with Firepower module cannot be deployed.
B. It cannot take actions such as blocking traffic.
C. It is out-of-band from traffic.
D. It must have inline interface pairs configured.

 

Answer: D

Question 14

An engineer wants to generate NetFlow records on traffic traversing the Cisco ASA. Which Cisco ASA command must be used?

A. flow-export destination inside 1.1.1.1 2055
B. ip flow monitor input
C. ip flow-export destination 1.1.1.1 2055
D. flow exporter

 

Answer: A

Explanation

The syntax of this command is: flow-export destination interface-name ipv4-address | hostname udp-port

This command is used on Cisco ASA to configure Network Secure Event Logging (NSEL) collector to which NetFlow packets are sent. The destination keyword indicates that a NSEL collector is being configured.

+ The interface-name argument is the name of the ASA and ASA Services Module interface through which the collector is reached.
+ The ipv4-address argument is the IP address of the machine running the collector application.
+ The hostname argument is the destination IP address or name of the collector.
+ The udp-port argument is the UDP port number to which NetFlow packets are sent.

You can configure a maximum of five collectors. After a collector is configured, template records are automatically sent to all configured NSEL collectors.

Reference: https://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/monitor_nsel.html

Question 15

How many interfaces per bridge group does an ASA bridge group deployment support?

A. up to 2
B. up to 4
C. up to 8
D. up to 16

 

Answer: B

Explanation

Each of the ASAs interfaces need to be grouped into one or more bridge groups. Each of these groups acts as an independent transparent firewall. It is not possible for one bridge group to communicate with another bridge group without assistance from an external router.

As of 8.4(1) upto 8 bridge groups are supported with 2-4 interface in each group. Prior to this only one bridge group was supported and only 2 interfaces.

Up to 4 interfaces are permitted per bridgegroup (inside, outside, DMZ1, DMZ2)

Question 16

Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two)

A. packet decoder
B. SIP
C. modbus
D. inline normalization
E. SSL

 

Answer: B E

Explanation

Application layer protocols can represent the same data in a variety of ways. The Firepower System provides application layer protocol decoders that normalize specific types of packet data into formats that the intrusion rules engine can analyze. Normalizing application-layer protocol encodings allows the rules engine to effectively apply the same content-related rules to packets whose data is represented differently and obtain meaningful results.

Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/Application_Layer_Preprocessors.html#ID-2244-0000080c

FirePower uses many preprocessors, including DNS, FTP/Telnet, SIP, SSL, SMTP, SSH preprocessors.

Comments (18) Comments
  1. Phil
    September 6th, 2020

    Q11: could be correct answers CE or DE?

  2. Anonymous
    September 7th, 2020

    Q11: is it not D and E?

  3. Anonymous
    October 12th, 2020

    Q11: D and E seems to be more correct

  4. markluistro
    November 12th, 2020

    Q11: BDE

  5. markluistro
    November 12th, 2020

    sorry Q11: its ADE

  6. mac
    November 23rd, 2020

    Agree, is it D E? Can anyone confirm?

  7. yourman
    November 24th, 2020

    Should be E and D.

  8. bobo77
    January 20th, 2021

    Q9 why D and not B???

  9. Question 9
    February 5th, 2021

    why it’s not B ?
    as we can see in the commands only inside ip addresses are mentioned not DMZ can somebody explain ?

  10. JxLx
    March 20th, 2021

    Q11, I agree on D,E, as seen on Ivan link.
    Configuring NSEL
    _Configuring NSEL Collectors_
    flow-export destination command -> Adds, edits, or deletes an NSEL collector to which NetFlow packets are sent. (E)
    _Configuring Flow-Export Actions Through Modular Policy Framework_
    class-map flow_export_class command -> Defines the class map that identifies traffic for which NSEL events need to be exported (D)

  11. JxLx
    March 20th, 2021

    @bobo77, Q9 is D because DMZ network is included in the redirect-acl.

  12. Anonymous
    April 10th, 2021

    yes q11 is wrong here. @securitytut could you modify to DE?
    thanks

  13. AP
    October 2nd, 2021

    Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two)

    A. Enable NetFlow Version 9.
    B. Create an ACL to allow UDP traffic on port 9996.
    C. Apply NetFlow Exporter to the outside interface in the inbound direction.
    D. Create a class map to match interesting traffic.
    E. Define a NetFlow collector by using the flow-export command.

    Answer: C E

    Correct ANS shuild be – D E
    https://www.cisco.com/c/en/us/td/docs/security/asa/special/netflow/asa_netflow.html

    Please review “Configure NSEL Collectors (CLI)” section Step-1 &2

  14. YourFriendlyNeighboorhoodSpider-man
    October 7th, 2021

    Q11 I can confirm that D and E should be the answer.
    @securitytut please update this question.

  15. securitytut
    October 7th, 2021

    @all: Thanks for your detection, we updated Q11!

  16. MISHO
    October 21st, 2021

    Question 1
    Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?
    A. To view bandwidth usage for NetFlow records, the QoS feature must be enabled.
    B. A sysopt command can be used to enable NSEL on a specific interface.
    C. NSEL can be used without a collector configured.
    D. A flow-export event type must be defined under a policy.
    Answer: D
    ————————————————————————————————————-
    Question 2
    Which feature is supported when deploying Cisco ASAv within AWS public cloud?
    A. multiple context mode
    B. user deployment of Layer 3 networks
    C. IPv6
    D. clustering
    Answer: B
    ————————————————————————————————————–
    Question 3
    Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?
    A. It allows traffic if it does not meet the profile.
    B. It defines a traffic baseline for traffic anomaly deduction.
    C. It inspects hosts that meet the profile with more intrusion rules.
    D. It blocks traffic if it does not meet the profile.
    Answer: B
    —————————————————————————————————————–
    Question 4
    Which statement about IOS zone-based firewalls is true?
    A. An unassigned interface can communicate with assigned interfaces
    B. Only one interface can be assigned to a zone.
    C. An interface can be assigned to multiple zones.
    D. An interface can be assigned only to one zone.
    Answer: D
    —————————————————————————————————————–
    Question 5
    What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?
    A. It tracks flow-create, flow-teardown, and flow-denied events.
    B. It provides stateless IP flow tracking that exports all records of a specific flow.
    C. It tracks the flow continuously and provides updates every 10 seconds.
    D. Its events match all traffic classes in parallel.
    Answer: A
    ——————————————————————————————————————
    Question 6
    Which CLI command is used to register a Cisco FirePower sensor to Firepower Management Center?
    A. configure system add
    B. configure manager add host
    C. configure manager delete
    D. configure manager add
    Answer: D
    ——————————————————————————————————————-
    Question 7
    Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?
    A. Correlation
    B. Intrusion
    C. Access Control
    D. Network Discovery
    Answer: D
    ——————————————————————————————————————
    Question 8
    Which ASA deployment mode can provide separation of management on a shared appliance?
    A. DMZ multiple zone mode
    B. transparent firewall mode
    C. multiple context mode
    D. routed mode
    Answer: C
    ——————————————————————————————————————-
    Question 10
    Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to othermanaged devices in a deployment?
    A. Group Policy
    B. Access Control Policy
    C. Device Management Policy
    D. Platform Service Policy
    Answer: D
    ———————————————————————————————————————
    Question 11
    Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two)
    A. Enable NetFlow Version 9.
    B. Create an ACL to allow UDP traffic on port 9996.
    C. Apply NetFlow Exporter to the outside interface in the inbound direction.
    D. Create a class map to match interesting traffic.
    E. Define a NetFlow collector by using the flow-export command.
    Answer: D E

Add a Comment