which encapsulation method takes precedence?
In remote access NAT environments with multiple encapsulation schemes enabled, which
encapsulation method takes precedence?
which type of Telnet connection would you have the end user make?
Clientless SSL VPN (WebVPN) allows a user to securely access resources on the corporate LAN
from anywhere with an SSL-enabled Web browser. You are asked to configure Telnet port
forwarding to a specific server on the clientless SSL VPN portal. A clientless SSL VPN user has
called to complain that after she starts the application helper, her attempts to establish a Telnet
connection to 10.0.4.3 time out. If the clientless SSL VPN configuration is correct, which type of
Telnet connection would you have the end user make?
which three parameters are configurable group attributes?
When configuring group attributes in the Cisco VPN Concentrator, which three parameters are
configurable group attributes? Choose three.
What is the maximum number of transforms in a transform set?
What is the maximum number of transforms in a transform set?
which set of Modular Policy Framework components will be included?
You work as a network security administrator for your company. Now, you are asked to configure
the corporate Cisco ASA security appliance to take the following steps on its outside interface:
–rate limit all IP traffic from telecommuting system engineers to the insidehost
–drop all HTTP requests from the Internet to the web server that have a body length greater than
1000 bytes
–prevent users on network 192.168.6.0/24 from using the FTP PUT command to store .exe files
on the FTP server
In order to achieve this objective, which set of Modular Policy Framework components will be
included?
How can an administrator accommodate the different access needs in a Cisco VPN Concentrator?
How can an administrator accommodate the different access needs in a Cisco VPN Concentrator?
Which statement about authorization and the PIX Firewall is true?
Which statement about authorization and the PIX Firewall is true?
which product should you choose?
If the primary role of the VPN product is to perform remote access VPN with a few site-to-site
connections, which product should you choose?
Which items are supported bookmark types?
Tom wants to configure bookmarks for the clientless SSL VPN portal on his Cisco ASA security
appliance. Which items are supported bookmark types?
Why use the shun command?
Why use the shun command?