What happens while adding the same-security-traffic permit inter-interface command to a Cisco ASA?
What happens while adding the same-security-traffic permit inter-interface command to a Cisco
ASA?
Which two methods can be used to decrease the amount of time it takes for an active Cisco ASA …?
Which two methods can be used to decrease the amount of time it takes for an active Cisco ASA
adaptive security appliance to fail over to its standby failover peer in an active/active failover
configuration? (Choose two.)
which circumstance would only the translated address be sent to the NM-CIDS for processing?
Under which circumstance would only the translated address be sent to the NM-CIDS for
processing?
which three traffic types are inspected by default?
In the default global policy, which three traffic types are inspected by default? (Choose three.)
When are duplicate objects allowed in object groups?
When are duplicate objects allowed in object groups?
Which two actions will accomplish this?
You would like to have your inline sensor deny attackers inline when events occur that have Risk
Ratings over 85. Which two actions will accomplish this? (Choose two.)
Which are key devices in the SAFE SMR remote user network?
Which are key devices in the SAFE SMR remote user network? Choose two.
How to handle FTP on the security appliance after this policy is applied?
You are the network security administrator for the company. You create an FTP inspection policy
including the strict option, and it is applied to the outside interface of the corporate adaptive
security appliance. How to handle FTP on the security appliance after this policy is applied?
(Choose three.;)
Which role would you assign to the account for your assistant?
You are the network security administrator for a company. You want to create a user account for
your assistant that gives the assistant the second-highest level of privileges. You want to ensure
that your assistant can view all events and tune signatures.
Which role would you assign to the account for your assistant?
which one would configure the adaptive security appliance to use an ACS server for console access authenticati
For the following commands, which one would configure the adaptive security appliance to use an
ACS server for console access authentication?