What role will be assigned to the user?
A network administrator is creating an ASA-CX administrative user account with the following
parameters:
– The user will be responsible for configuring security policies on
network devices.
– The user needs read-write access to policies.
– The account has no more rights than necessary for the job.
What role will be assigned to the user?
Which of the following would need to be created to conf…
Which of the following would need to be created to configure an application-layer inspection of
SMTP traffic operating on port 2525?
Which component does Cisco ASDM require on the host Cis…
Which component does Cisco ASDM require on the host Cisco ASA 5500 Series or Cisco PIX
security appliance?
which account has most likely been improperly modified?
If you encounter problems logging in to the Cisco Security Manager 4.4 web server or client or
backing up its databases, which account has most likely been improperly modified?
Which feature must you configure to open data- channel …
You are configuring a Cisco IOS Firewall on a WAN router that is operating as a Trusted Relay
Point (TRP) in a voice network. Which feature must you configure to open data- channel pinholes
for voice packets that are sourced from a TRP within the WAN?
which interface on a Cisco ASA 1000V firewall should a …
To which interface on a Cisco ASA 1000V firewall should a security profile be applied when a VM
sits behind it?
Which technology provides forwarding-plane abstraction …
Which technology provides forwarding-plane abstraction to support Layer 2 to Layer 7 network
services in Cisco Nexus 1000V?
Which two device types can Cisco Prime Security Manager…
Which two device types can Cisco Prime Security Manager manage in Multiple Device mode?
(Choose two.)
Which two features are supported when configuring clust…
Which two features are supported when configuring clustering of multiple Cisco ASA appliances?
(Choose two.)
When should the security appliance force remote IP phon…
A Cisco ASA is configured for TLS proxy. When should the security appliance force remote IP
phones connecting to the phone proxy through the internet to be in secured mode?