pre-shared key or digital certificates d.DH Group 1,2,or5
Match each IKE component to its supported option.
1. IKE authentication
2. IKE encryption
3. IKE data authentication/integrity
4. IKE key negotiation
a.3DES or AES
b.MD5 or SHA-1
c. pre-shared key or digital certificates
d.DH Group 1,2,or5
How many modules exist in the SAFE Enterprise Network Campus?
How many modules exist in the SAFE Enterprise Network Campus?
What are two instances when sparse-mode PIM is most useful?
What are two instances when sparse-mode PIM is most useful? (Choose two.)
What does the security appliance do?
You word as a network administrator. You are asked to examine the current firewall configurations
on the LA-ASA Adaptive Security Appliances using the Cisco Adaptive Security Device Manage
(ASDM) utility. You need to answer the multiple-choice questions in this simulation using the
appropriate Cisco ASDM configuration screens.
Assume that the security appliance receives on its inside interface an HTTP packet that is
destined for an IP address of which the security appliance has no knowledge. What does the
security appliance do?
Which of the following statements are true?
You word as a network administrator. You are asked to examine the current firewall configurations
on the LA-ASA Adaptive Security Appliances using the Cisco Adaptive Security Device Manage
(ASDM) utility. You need to answer the multiple-choice questions in this simulation using the
appropriate Cisco ASDM configuration screens.
Which of the following statements are true?(Choose two)
Which statements are true according to the current NAT configuration?
You word as a network administrator . You are asked to examine the current firewall
configurations on the LA-ASA Adaptive Security Appliances using the Cisco Adaptive Security
Device Manage (ASDM) utility. You need to answer the multiple-choice questions in this
simulation using the appropriate Cisco ASDM configuration screens.
Which statements are true according to the current NAT configuration?(Choose two)
Which one of the following statements is correct according to the current configuration?
You word as a network administrator. You are asked to examine the current firewall configurations
on the LA-ASA Adaptive Security Appliances using the Cisco Adaptive Security Device Manage
(ASDM) utility. You need to answer the multiple-choice questions in this simulation using the
appropriate Cisco ASDM configuration screens.
Which one of the following statements is correct according to the current configuration?
What traffic is permitted based on the current configuration?
You word as a network administrator. You are asked to examine the current firewall configurations
on the LA-ASA Adaptive Security Appliances using the Cisco Adaptive Security Device Manage
(ASDM) utility. You need to answer the multiple-choice questions in this simulation using the
appropriate Cisco ASDM configuration screens.
What traffic is permitted based on the current configuration?(Choose two)
Which three are types of events that are generated by the sensor?
Which three are types of events that are generated by the sensor? (Choose three.)
Which one of the following Cisco Security Management products is able to perform (syslog) events normalization
Which one of the following Cisco Security Management products is able to perform (syslog)
events normalization?