which of the above mentioned commands?
The graphic shows a partial configuration. An account manager (AM) at a small site wants to
access the boston_sales.cisco.com server. The account manager knows the name, but not the IP
address of the server. The AM’s PC requests DNS resolution of the inside web server address
from a DNS server on an outside network. To enable the PIX Firewall to perform a DNS A record
translation correctly for the above mentioned application, the DNS key word should be added to
which of the above mentioned commands?
which command should an administrator use to map the www server on the DMZ to a static address on the outside
Which statements about SSH and the PIX Firewall are true?
Which statements about SSH and the PIX Firewall are true? Choose three.
what commands should they enter to force remote PC users to authenticate before allowing them access to a VPN
For added security, the network manager wants PCs on the inside network at the remote office to
authenticate with an ACS server, ACS1, at the central site before allowing these individuals PCs to
access a VPN tunnel. As the network administrator, at which location and what commands should
they enter to force remote PC users to authenticate before allowing them access to a VPN tunnel?
(Choose two.)
Which ACL parameters can be replaced by object-groups?
Which ACL parameters can be replaced by object-groups? Choose three.
which two methods enable a PC on the partnernet to connect to a server on DMZ1 and deny the Partnernet PC acce
What could be the cause of the problem?
You have installed a FWSM in your Catalyst 6500 switch, initialized it in the switch, configured
switch VLANs, and configured the module interfaces; however, you are unable to establish
outbound connections. You check your configuration and find that you have correctly configured
the six basic commands (nameif, interface, ip address, nat, global, and route). What could be the
cause of the problem?
Why use ESP security protocol rather than the AH security protocol when creating a VPN with IPSec?
Why use ESP security protocol rather than the AH security protocol when creating a VPN with
IPSec?
What default group is installed with the PIX MC?
What default group is installed with the PIX MC?