what three configuration steps must be completed to create a custom firewall policy?
When configuring a custom firewall policy in the VPN Concentrator, what three configuration steps
must be completed to create a custom firewall policy? Choose three.
Which feature will not allow the Cisco VPN Client to connect without a firewall running?
Which feature will not allow the Cisco VPN Client to connect without a firewall running?
Which statements about the static command are true?
Which statements about the static command are true? Choose two.
how to determine the appropriate version of Cisco AnyConnect VPN Client to download?
You are the network administrator of your company. You would like to add SSL VPN Cisco
AnyConnect VPN Client for use by remote users. After checking the Cisco software download site,
you discovered a number of different versions of Cisco AnyConnect VPN Client Software available
for download. If you know the Cisco ASA Adaptive Security Appliance Software version and the
remote user’s PC operating system, how to determine the appropriate version of Cisco
AnyConnect VPN Client to download?
which IP address does the Cisco VPN Concentrator advertise?
For client RRI, which IP address does the Cisco VPN Concentrator advertise?
Which feature enables the Concentrator administrator to centrally define a set of rules for the Cisco VPN Clie
Which feature enables the Concentrator administrator to centrally define a set of rules for the
Cisco VPN Client firewall?
What is the default port number that the PIX Firewall uses to contact the AUS?
What is the default port number that the PIX Firewall uses to contact the AUS?
Which two statements are true about multiple context mode?
Which two statements are true about multiple context mode? (Choose two.)
What are two Quick Configuration elements used in the configuration of IPSec groups?
What are two Quick Configuration elements used in the configuration of IPSec groups? Choose
two.
which is a requirement for configuring the Cisco ASA security appliance for an identity certificate?
You are a senior Cisco ASA security appliance administrator. Now, a new employee of your
company asks you to help to configure a Cisco ASA security appliance for an identity certificate to
be used for IPsec VPNs. Refer to the two Cisco ASDM configuration screens presented, which is
a requirement for configuring the Cisco ASA security appliance for an identity certificate?