Which of the following IP addresses can you configure inline? (Select the best answer.)
You are configuring dynamic PAT on a Cisco ASA 5500 using the CLI. The ASA is running software version 8.3. Which of the following IP addresses can you configure inline? (Select the best answer.) A. inside global B. outside global C. inside local D. outside local Explanation: You can configure an inside global address inline […]
Which of the following is an output spreading technique that spammers use to manipulate reputation scores and
Which of the following is an output spreading technique that spammers use to manipulate reputation scores and defeat filters? (Select the best answer.) A. phishing B. snowshoe spam C. waterfalling D. listwashing Explanation: Of the available choices, snowshoe spam is an output spreading technique that spammers use to manipulate reputation scores and defeat filters. Snowshoe […]
Which of the following features protects the control plane by classifying traffic into three separate control
Which of the following features protects the control plane by classifying traffic into three separate control plane subinterfaces? (Select the best answer.) A. CoPP B. CPPr C. RBAC D. uRPF Explanation: Control Plane Protection (CPPr) protects the control plane by classifying control plane traffic into three separate subinterfaces: the host subinterface, the transit subinterface, and […]
Which of the following enables the validation of both user and device credentials in a single EAP transaction?
Which of the following enables the validation of both user and device credentials in a single EAP transaction? (Select the best answer.) A. PEAP B. EAP-FAST C. EAP-FAST with EAP chaining D. EAP-MD5 Explanation: Extensible Authentication Protocol (EAP)Flexible Authentication via Secure Tunneling (FAST) with EAP chaining, which is also sometimes called EAPFAST version 2 (EAPFASTv2), […]
Which of the following is typically used to manage a Cisco router in-band? (Select the best answer.)
Which of the following is typically used to manage a Cisco router in-band? (Select the best answer.) A. a VTY port B. a serial port C. a console port D. an auxiliary port Explanation: A virtual terminal (VTY) port is typically used to manage a Cisco router in-band. When a Cisco device is operating in […]
Which of the following connection profiles will use the boson_grp group policy? (Select the best answer.)
Which of the following connection profiles will use the boson_grp group policy? (Select the best answer.) A. only the boson connection profile B. only the DefaultRAGroup connection profile C. only the DefaultWEBVPNGroup connection profile D. both the boson connection profile and the DefaultWEBVPNGroup connection profile E. both the DefaultRAGroup connection profile and the DefaultWEBVPNGroup Explanation: […]
Which of the following statements is true regarding VPN connections made by a user who is using the john user
Which of the following statements is true regarding VPN connections made by a user who is using the john user account? (Select the best answer.) A. The user will be unable to establish a VPN connection by using the boson tunnel group. B. The user will be able to establish a connection by using any […]
Which of the following statements are true regarding clientless SSL VPN connections that are made by using the
Which of the following statements are true regarding clientless SSL VPN connections that are made by using the boson tunnel group? (Select 3 choices.) A. VPN clients will be authenticated using the local AAA database. B. VPN clients will be authenticated using digital certificates. C. The DfltGrpPolicy group policy will be applied to the VPN […]
Which of the following tunneling protocols will the jane user account be able to use when establishing a clien
You are using ASDM to verify a clientless SSL VPN configuration made by a junior administrator on an ASA. Please click exhibit to answer the following questions. Which of the following tunneling protocols will the jane user account be able to use when establishing a clientless SSL VPN connection by using the boson tunnel group? […]
You are using ASDM to verify a clientless SSL VPN configuration made by a junior administrator on an ASA. Plea
You are using ASDM to verify a clientless SSL VPN configuration made by a junior administrator on an ASA. Please click exhibit to answer the following questions. Exhibit: Which of the following user accounts will be able to connect to the ASA by using ASDM? (Select the best answer.) A. only john B. only boson […]