Which set of steps does the administrator need to take to obtain this information?
The adaptive security appliance at Company XYZ corporate headquarters has recently been logging more threats and anomalies than usual. The network security administrator is unsure of the severity of these potential threats and anomalies. To get a broader view of the overall situation and determine what action to take, the administrator wants to gather information on threat-related protocols and ports. For example, the administrator wants to know about bursts on a particular port or protocol or on a set of ports and protocols.
Which set of steps does the administrator need to take to obtain this information?
Which event triggers failover at the failover group level in an active/active failover configuration?
Which event triggers failover at the failover group level in an active/active failover configuration?
Why might you want to configure VLANs on a security appliance interface?
Why might you want to configure VLANs on a security appliance interface?
Which three actions would you be able to do with a Layer 3/4 modular policy?
Which three actions would you be able to do with a Layer 3/4 modular policy? (Choose three )
Which four steps for configuring a redundant interface and using it as a failover link are correct?
Which four steps for configuring a redundant interface and using it as a failover link are correct? (Choose four.)
What is the purpose of the redundant interface feature of the security appliance?
What is the purpose of the redundant interface feature of the security appliance?
Which three statements about protocol inspection on the Cisco ASA adaptive security appliance are true?
Which three statements about protocol inspection on the Cisco ASA adaptive security appliance are true? (Choose three. )
Which two statements accurately describe multiple context mode?
Which two statements accurately describe multiple context mode? (Choose two.)
Which two statements accurately describe the effects of this configuration?
Which two statements accurately describe the effects of this configuration? (Choose two.)
class-map INBOUND_HTTP_TRAFFIC
match access-list TOINSIDEHOST
class-map OUTBOUND_HTTP_TRAFFIC
match access-list TOOUTSIDEHOST
policy-map MYPOLICY
class INBOUND_HTTP_TRAFFIC
inspect http
set connection conn-max 100
policy-map MYOTHERPOLICY
class OUTBOUND_HTTP_TRAFFIC
inspect http
service-policy MYOTHERPOLICY interface inside
service-policy MYPOLICY interface outside
Which three steps are mandatory for configuring VLAN trunking on a security appliance interface?
Which three steps are mandatory for configuring VLAN trunking on a security appliance interface? (Choose three. )