PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

what traffic would be logged to the AAA server?

On the basis of following configuration commands displayed in the exhibit, what traffic would be
logged to the AAA server?
aaa-server AUTHINBOUND protocol tacacs+
aaa-server MYGROUP protocol tacacs+
aaa-server MYGROUP (inside) host 192.168.30.1 MYSECRETKEY timeout 20
aaa authentication include any inside 0 0 0 0 MYGROUP
aaa authorization include any inside 0 0 0 0 MYGROUP
aaa accounting include any inside 0 0 0 0 MYGROUP

Which two actions will help your assistant manage the false positives?

You recently noticed a large volume of alerts generated by attacks against your web servers.
Because these are mission-critical servers, you keep them up to date on patches. As a result, the
attacks fail and your inline sensor generates numerous false positives. Your assistant, who
monitors the alerts, is overwhelmed.
Which two actions will help your assistant manage the false positives? (Choose two.)

What should be placed in field A (AAA Client Hostname) and field B (AAA Client IP Address)?

You are a network administrator for the company. Study the following exhibit carefully, you want to
authenticate remote users who are accessing the WEB1 server from the Internet. The ASA1
security appliance would verify the credentials of a user with the TX_ACS AAA server via RADIUS
when the remote user initiates a session to the WEB1 server. In order to achieve this purpose, you
should load and configure Cisco Secure ACS software on the TX_ACS AAA server. During the
process you must correctly configure the AAA client information in the Cisco Secure ACS network
configuration window.
What should be placed in field A (AAA Client Hostname) and field B (AAA Client IP Address)?