Which two statements about Cisco ASA failover troubleshooting are true? (Choose two.)
Which two statements about Cisco ASA failover troubleshooting are true? (Choose two.)
which two verification steps should be performed if a user context does not pass user traffic?
When troubleshooting a Cisco ASA that is operating in multiple context mode, which two verification steps should be performed if a user context does not pass user traffic? (Choose two.)
Which three configurations are needed to enable SNMPv3 support on the Cisco ASA? (Choose three.)
Which three configurations are needed to enable SNMPv3 support on the Cisco ASA? (Choose three.)
Which two statements are true? (Choose two.)
When ordering the licenses for their Cisco ASAs, which two licenses must they order that are "platform sp
A customer is ordering a number of Cisco ASAs for their network. For the remote or home office, they are purchasing the Cisco ASA 5505. When ordering the licenses for their Cisco ASAs, which two licenses must they order that are “platform specific” to the Cisco ASA 5505? (Choose two.)
Which two packet classification methods can be used by the Cisco ASA to determine which security context to fo
The Cisco ASA is configured in multiple mode and the security contexts share the same outside physical interface. Which two packet classification methods can be used by the Cisco ASA to determine which security context to forward the incoming traffic from the outside interface? (Choose two.)
Which two CLI commands result from this configuration? (Choose two.)
Which two statements about why the Cisco ASA configuration is not meeting the specified HTTP inspection requir
Refer to the exhibit and to the four HTTP inspection requirements and the Cisco ASA configuration.
Which two statements about why the Cisco ASA configuration is not meeting the specified HTTP inspection requirements are true? (Choose two.)
1. All outside clients can use only the HTTP GET method on the protected 10.10.10.10 web server.
2. All outside clients can access only HTTP URIs starting with the “/myapp” string on the protected 10.10.10.10 web server.
3. The security appliance should drop all requests that contain basic SQL injection attempts (the string “SELECT” followed by the string “FROM”) inside HTTP arguments.
4. The security appliance should drop all requests that do not conform to the HTTP protocol.
Which three statements are the default security policy on a Cisco ASA appliance? (Choose three.)
Which three statements are the default security policy on a Cisco ASA appliance? (Choose three.)
Which two configurations are the minimum needed to enable EIGRP on the Cisco ASA appliance? (Choose two.)
Which two configurations are the minimum needed to enable EIGRP on the Cisco ASA appliance? (Choose two.)