How will the user be authenticated to the VPN?
You are using ASDM to verify a VPN configuration made by another administrator on an ASA. Please click
exhibit to examine the network configuration.
Exhibit:
A user accesses the VPN by typing https://203.0.113.1/BosonUsers in a browser’s location bar. How will the
user be authenticated to the VPN? (Select the best answer.)
Which interface will accept the connection?
You are using ASDM to verify a VPN configuration made by another administrator on an ASA. Please click
exhibit to examine the network configuration.
Exhibit:
A user accesses the VPN by typing https://203.0.113.1/BosonUsers in a browser’s location bar. Which interface
will accept the connection? (Select the best answer.)
Which of the following can be used by Cisco IPS devices…
Which of the following can be used by Cisco IPS devices to report intrusion alerts? (Select 2 choices.)
Which of the following actions will occur next?
An inbound TCP SYN packet arrives at the ingress interface of a Cisco ASA 8.2 firewall. The packet is not part
of an established session. The packet reaches the interface’s internal buffer and the input counter is
incremented.
Which of the following actions will occur next? (Select the best answer.)
Which of the following could be the problem?
You have configured a Cisco ESA URL filtering with a URL Category action that redirects the URLs of adult
content sites and sites that have not been categorized to the Cisco Cloud Web Security proxy service.
However, you receive a report that users are successfully accessing adult content sites from the company
network.
Which of the following could be the problem? (Select the best answer.)
Which of the following is true?
You upload a file named isitbad.docx to AMP for analysis. While reviewing the AMP logs, you receive the
following output:
Wed Feb 17 12:41:05 2015 Info: File reputation query initiating. File Name =
‘isitbad.docx’, MID = 856, File Size = 174401 bytes, File Type = application/msword
Wed Feb 17 12:41:10 2015 Info: Response received for file reputation query from Cache.
File Name = ‘isitbad.docx’, MID = 856, Disposition = file unknown, Malware = None, Reputation Score = 0,
sha256 = 78d80f8fb0e6eaa2988d11607ec6a00840147f8188f6db8b7d00d907440d7aaa, upload_action = 1
Which of the following is true? (Select the best answer.)
Which of the following tasks does CASE on an ESA not pe…
Which of the following tasks does CASE on an ESA not perform when detecting a possible threat? (Select the
best answer.)
Which of the following statements about the test aaa gr…
Which of the following statements about the test aaa group command is not true? (Select the best answer.)
Which of the following are true of ARP traffic on a Cis…
Which of the following are true of ARP traffic on a Cisco zonebased firewall in transparent mode? (Select 2
choices.)
which of the following authentication protocols is not …
On a Cisco ASA, which of the following authentication protocols is not supported by the TACACS+ server?
(Select the best answer.)