Which two DH groups does the VPN3000 Concentrator support for key exchange?
Which two DH groups does the VPN3000 Concentrator support for key exchange? Choose two.
What is the purpose of the Audit Trail function?
What is the purpose of the Audit Trail function?
Which statement is true?
Which statement is true?
Which three operating systems are supported for deployment of CSA?
Which three operating systems are supported for deployment of CSA? (Choose three.)
How to find the MD5 and SHA-1 thumb print of the certificate on the basis of the following exhibit?
You work as a network administrator for your company. You are in charge of a Cisco ASA security
appliance for remote access IPsec VPNs, you are assisting a user who has a digital certificate
configured for the Cisco VPN Client. How to find the MD5 and SHA-1 thumb print of the certificate
on the basis of the following exhibit?
which should you do?
If you configure a VPN between a Cisco VPN Client and the PIX Firewall using pre-shared keys
for authentication, which should you do? Choose two.
What will happen when the remote user has successfully authenticated according to the following exhibit?
Which of the following is a Cisco proprietary-based solution?
Which of the following is a Cisco proprietary-based solution?
What can you do?
You are the network security administrator for a large network. You want to require users to
authenticate for connections through the PIX Firewall using services or protocols that do not
support authentication. What can you do?
which IP address does the Cisco VPN Concentrator advertise?
For network extension RRI, which IP address does the Cisco VPN Concentrator advertise?