Which commands configure the PIX Firewall’s PPPoE client?
Which commands configure the PIX Firewall’s PPPoE client?
What is the purpose of network access control rules?
What is the purpose of network access control rules?
what is true about the IPSec SA?
When the IPSec client-to-LAN applications are changed from pre-shared keys to digital
certificates, what is true about the IPSec SA?
Which two attacks could an attacker use during the probe phase of an attack?
Which two attacks could an attacker use during the probe phase of an attack? (Choose two.)
which action will be taken by the security appliance on HTTP traffic entering its outside interface?
On the basis of the following information. Applying the HTTP inspection map named
MY_HTTP_MAP to the outside interface of the security appliance. Because of this configuration,
which action will be taken by the security appliance on HTTP traffic entering its outside interface?
NOTE: The CLI version of this configuration is provided here.
regex URL_ABC “.+abc\.com”
regex URL_DEF “.+def\.com”
regex URL_XYZ “.+xyz\.com”
. . .
class-map OUTSIDE_CLASS
match any
class-map type regex match-any URLs
match regex URL_ABC
match regex URL_XYZ
class-map type inspect http match-all
RESTRICTED_HTTP
match request body length gt 1000
match not request uri regex class URLs
. . .
policy-map type inspect http MY_HTTP_MAP
parameters
protocol-violation action drop-connection
class RESTRICTED_HTTP
drop-connection
policy-map OUTSIDE_POLICY
class OUTSIDE_CLASS
inspect http MY_HTTP_MAP
. . .
service-policy OUTSIDE_POLICY interface outside
what configuration privileges does each additional administrator have?
When there are multiple concurrent Cisco VPN Concentrator administration sessions, what
configuration privileges does each additional administrator have?
Which PIX Firewall feature should you configure to minimize the average search time for access control lists c
You are the network security administrator for an enterprise network with a complex security
policy. Which PIX Firewall feature should you configure to minimize the average search time for
access control lists containing a large number of entries?
Which two items make up Agent kits?
Which two items make up Agent kits? (Choose two.)
What are the two types of certificates in a central CA environment?
What are the two types of certificates in a central CA environment? Choose two.
What is the reason that the status of the CSC-SSM is "Up" when it is not activated?
In your company, you are responsible for administrating a Cisco ASA security appliance with a
Cisco ASA CSC-SSM. You use a new version of software to upgrade the CSC-SSM. After
finishing the upgrade, you issue the show module 1 detail command; The following exhibit displays
the results of this command. What is the reason that the status of the CSC-SSM is “Up” when it is
not activated?